MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 617208cb1572a2d167753cb9a163fee04a6a5df5d75f555b14c79a1f3cb09d8e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 617208cb1572a2d167753cb9a163fee04a6a5df5d75f555b14c79a1f3cb09d8e
SHA3-384 hash: da953adf32a1ef25425cb3747a13ae159338f4b9bb3f70177b979260e545d334498bcd4b51e7844ca35687138f32179a
SHA1 hash: 8c9e6e86f94f3af506207363c62dcd46213fe464
MD5 hash: ed965ca1db6e57f69d6a93af243bdcc7
humanhash: shade-football-autumn-sixteen
File name:Arrival Notice_607728119.pdf.vbs
Download: download sample
Signature RemcosRAT
File size:357'271 bytes
First seen:2022-08-17 06:30:38 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 1536:tLDX5QJyNyrbLAsI9D+TzDJpSa2s8yZTRz7x1gPI/v8zOV8B2sUN4GU3wTPxR1zB:tnJQlbUf8q/tcdTtnOsxkpxlkh
Threatray 15'316 similar samples on MalwareBazaar
TLSH T11A741B503311A5A54D7E5891B46C875A8B682112B7E7E7720B02D7FA8B64433EB33ECF
Reporter abuse_ch
Tags:RemcosRAT vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
161
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
evad.troj.spyw
Score:
92 / 100
Signature
Antivirus detection for URL or domain
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Tries to detect Any.run
Tries to harvest and steal browser information (history, passwords, etc)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Very long command line found
Wscript starts Powershell (via cmd or directly)
Yara detected GuLoader
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 685389 Sample: Arrival Notice_607728119.pdf.vbs Startdate: 17/08/2022 Architecture: WINDOWS Score: 92 38 bustabantu1996.ddns.net 2->38 40 geoplugin.net 2->40 42 cdn.discordapp.com 2->42 56 Antivirus detection for URL or domain 2->56 58 Yara detected GuLoader 2->58 60 Uses an obfuscated file name to hide its real file extension (double extension) 2->60 62 2 other signatures 2->62 9 wscript.exe 1 1 2->9         started        signatures3 process4 signatures5 64 Wscript starts Powershell (via cmd or directly) 9->64 66 Very long command line found 9->66 68 Encrypted powershell cmdline option found 9->68 12 powershell.exe 27 9->12         started        process6 signatures7 72 Tries to detect Any.run 12->72 15 ielowutil.exe 5 14 12->15         started        19 csc.exe 3 12->19         started        22 conhost.exe 12->22         started        24 11 other processes 12->24 process8 dnsIp9 46 bustabantu1996.ddns.net 185.165.153.84, 49772, 49775, 49776 DAVID_CRAIGGG Netherlands 15->46 48 cdn.discordapp.com 162.159.134.233, 443, 49771 CLOUDFLARENETUS United States 15->48 50 geoplugin.net 178.237.33.50, 49773, 80 ATOM86-ASATOM86NL Netherlands 15->50 52 Tries to detect Any.run 15->52 54 Injects a PE file into a foreign processes 15->54 26 ielowutil.exe 14 15->26         started        30 ielowutil.exe 1 15->30         started        32 ielowutil.exe 15->32         started        36 C:\Users\user\AppData\Local\...\uv4cg2dw.dll, PE32 19->36 dropped 34 cvtres.exe 1 19->34         started        file10 signatures11 process12 dnsIp13 44 192.168.11.1 unknown unknown 26->44 70 Tries to harvest and steal browser information (history, passwords, etc) 26->70 signatures14
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:lucky downloader persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks QEMU agent file
Checks computer location settings
Guloader,Cloudeye
Remcos
Malware Config
C2 Extraction:
bustabantu1996.ddns.net:6699
bustabantu0817.duckdns.org:6699
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Visual Basic Script (vbs) vbs 617208cb1572a2d167753cb9a163fee04a6a5df5d75f555b14c79a1f3cb09d8e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments