MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 62da0e40b7ea9304ca48d767fd6ddd0ad1305489622edebde730d0ab942a1271. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 62da0e40b7ea9304ca48d767fd6ddd0ad1305489622edebde730d0ab942a1271
SHA3-384 hash: d01a5082fa54e5d4c54a9bb454c96d70ced4056d2d237b218df44080c4c8c4ef560cc98eba816873fc21076f2b421f87
SHA1 hash: cab7836b388a7ede80f4db92718d9822d3df442f
MD5 hash: 4845e5b5907373b1fb56d0abb6423596
humanhash: eighteen-lake-beer-kilo
File name:fsdf98932898gf9g987dsfhfkjhsdf8098sfd0808gdf8g90880d8fgd0fg8098fdg09.hta
Download: download sample
Signature RemcosRAT
File size:70'405 bytes
First seen:2025-11-14 09:58:05 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:application/octet-stream
ssdeep 192:obe2D/QzJnzpuyZBIfcDvml2WcWuBg9e6abzZEniZuBbaEbQFunFI2bzHGVupF22:ty
Threatray 1'773 similar samples on MalwareBazaar
TLSH T18863FF350424497E53253BAE0B1C52164BC1C76F7E58CEA2B69659E3EBC37A23D278C3
Magika html
Reporter pr0xylife
Tags:hta RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme spawn
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 base64 nemucod obfuscated obfuscated overlay powershell xloader
Verdict:
Malicious
File Type:
hta
First seen:
2025-11-14T07:06:00Z UTC
Last seen:
2025-11-14T20:04:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Generic Trojan-Downloader.JS.SLoad.sb Trojan.JS.SAgent.sb Trojan.Agentb.TCP.C&C PDM:Trojan.Win32.Generic
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
Html
Threat name:
Script-JS.Backdoor.Xloader
Status:
Malicious
First seen:
2025-11-14 07:39:54 UTC
File Type:
Binary
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Remcos
Remcos family
Malware Config
C2 Extraction:
198.23.177.196:1977
Dropper Extraction:
https://archive.org/download/optimized_msi_20251114/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments