MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6108f85080999cc90f2369b72109a3dc7537a3f7f5da14d988b48ca474cdc2d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments 1

SHA256 hash: 6108f85080999cc90f2369b72109a3dc7537a3f7f5da14d988b48ca474cdc2d3
SHA3-384 hash: f2b9d1ae40edaed3085c8e4f7986fd6071927debccc9d79d4d9ed3d464f4e76ae8653bffe9b698bd88ad1fe09ca56cf9
SHA1 hash: fd8cb36758c02b2a76a41a8629c5515009d4398a
MD5 hash: c93b774f6faa80532d2df3f201e1feb0
humanhash: mississippi-orange-white-romeo
File name:c93b774f6faa80532d2df3f201e1feb0
Download: download sample
Signature RemcosRAT
File size:723'456 bytes
First seen:2021-11-04 18:45:18 UTC
Last seen:2021-11-04 20:29:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:lb2EiNY1zGtkKoPUyu291QlIFsd3fxLFTslTrMR3yu8+7EzqZ39aIqRIK73Q+six:JvQ5JgQl2sdlW1yyuF7EzqZyJjLTGX0
TLSH T111F42720F75D49C9C6FC3734CF25D1B017A16C6E2A108A1924F43DFBBABD61366316AA
File icon (PE):PE icon
dhash icon e8e8e859ccf0b0f0 (11 x AgentTesla, 8 x Formbook, 4 x Loki)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FİYAT TEKLİFİ.doc
Verdict:
Malicious activity
Analysis date:
2021-11-03 21:50:34 UTC
Tags:
exploit CVE-2017-11882 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated razy remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates an autostart registry key pointing to binary in C:\Windows
Detected Remcos RAT
Detected unpacking (creates a PE file in dynamic memory)
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 515947 Sample: zJ09NrIEDf Startdate: 04/11/2021 Architecture: WINDOWS Score: 100 74 yjune2021.duckdns.org 2->74 80 Found malware configuration 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 Multi AV Scanner detection for dropped file 2->84 86 13 other signatures 2->86 12 zJ09NrIEDf.exe 3 2->12         started        16 Windows NT session.exe 2 2->16         started        signatures3 process4 file5 72 C:\Users\user\AppData\...\zJ09NrIEDf.exe.log, ASCII 12->72 dropped 102 Contains functionality to detect virtual machines (IN, VMware) 12->102 104 Contains functionality to steal Chrome passwords or cookies 12->104 106 Contains functionality to capture and log keystrokes 12->106 110 2 other signatures 12->110 18 zJ09NrIEDf.exe 1 5 12->18         started        22 svchost.exe 12->22         started        24 zJ09NrIEDf.exe 12->24         started        108 Drops executables to the windows directory (C:\Windows) and starts them 16->108 26 Windows NT session.exe 3 16->26         started        signatures6 process7 dnsIp8 66 C:\Windows\...\Windows NT session.exe, PE32 18->66 dropped 68 C:\...\Windows NT session.exe:Zone.Identifier, ASCII 18->68 dropped 88 Creates an autostart registry key pointing to binary in C:\Windows 18->88 29 cmd.exe 1 18->29         started        32 cmd.exe 1 18->32         started        78 yjune2021.duckdns.org 194.5.97.131, 3030, 49754, 49755 DANILENKODE Netherlands 26->78 90 Installs a global keyboard hook 26->90 34 cmd.exe 1 26->34         started        file9 signatures10 process11 signatures12 112 Uses ping.exe to sleep 29->112 36 Windows NT session.exe 3 29->36         started        39 PING.EXE 1 29->39         started        42 conhost.exe 29->42         started        114 Uses cmd line tools excessively to alter registry or file data 32->114 116 Uses ping.exe to check the status of other devices and networks 32->116 44 conhost.exe 32->44         started        46 reg.exe 1 32->46         started        48 conhost.exe 34->48         started        50 reg.exe 1 34->50         started        process13 dnsIp14 70 C:\Users\user\...\Windows NT session.exe.log, ASCII 36->70 dropped 52 Windows NT session.exe 2 1 36->52         started        55 Windows NT session.exe 36->55         started        76 127.0.0.1 unknown unknown 39->76 file15 process16 signatures17 92 Detected Remcos RAT 52->92 94 Writes to foreign memory regions 52->94 96 Allocates memory in foreign processes 52->96 98 Injects a PE file into a foreign processes 52->98 57 cmd.exe 1 52->57         started        60 iexplore.exe 52->60         started        process18 signatures19 100 Uses cmd line tools excessively to alter registry or file data 57->100 62 conhost.exe 57->62         started        64 reg.exe 1 57->64         started        process20
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-11-03 13:13:29 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:oct end brand:microsoft evasion persistence phishing rat trojan
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Modifies registry key
Runs ping.exe
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Detected potential entity reuse from brand microsoft.
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
UAC bypass
Malware Config
C2 Extraction:
yjune2021.duckdns.org:3030
Unpacked files
SH256 hash:
d13c3d895963cba9f684d916112db944f6f55fd2feadb1aeaf7a738bd6411b8c
MD5 hash:
bf0ce6883f425397f16cc9359dad2bd5
SHA1 hash:
aa549ee9b22a118d608c0fa36ee7aaffc40a1c73
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
b0995dcd8787cbef22e3a3f2d480fae2e4a8ca5742b3ef983ff2a792d889b44d
MD5 hash:
8cf8cb4d1032cdcc3e5a5b1df5aa776a
SHA1 hash:
c738e6318ce6079edcd66ff5a0e34aea140c11d0
SH256 hash:
110a28b39b1e0840684110fa77a580effce50755cb865ce9df566f1fff308d05
MD5 hash:
17d644e87b9923fb2a0ed51e7594d82f
SHA1 hash:
863600e4908ebd4ed26285e210d983d04399e600
SH256 hash:
6108f85080999cc90f2369b72109a3dc7537a3f7f5da14d988b48ca474cdc2d3
MD5 hash:
c93b774f6faa80532d2df3f201e1feb0
SHA1 hash:
fd8cb36758c02b2a76a41a8629c5515009d4398a
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 6108f85080999cc90f2369b72109a3dc7537a3f7f5da14d988b48ca474cdc2d3

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-04 18:45:20 UTC

url : hxxp://binatonezx.tk/chungzx.exe