MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64a84bec84d96284205b8a487b36768a75c398e70b12ba590125570abff291bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 19 File information Comments

SHA256 hash: 64a84bec84d96284205b8a487b36768a75c398e70b12ba590125570abff291bb
SHA3-384 hash: 569c4429e35e86c54ef7104dde630b72122000e6313c769b31267500641ad9f683d40a9e7f3aa87d4d6cef18cb217b47
SHA1 hash: d641c490b93facf65216565fa791ac7b64026b73
MD5 hash: b73135a05ba0cfc192c9a02c24733592
humanhash: spaghetti-arizona-diet-california
File name:B73135A05BA0CFC192C9A02C24733592.exe
Download: download sample
Signature RemcosRAT
File size:1'536'512 bytes
First seen:2023-08-04 17:05:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2f4cc4c26fb236cfcb3f37f1dde590f5 (2 x ModiLoader, 2 x Zyklon, 1 x AgentTesla)
ssdeep 24576:a30AU6QvVe3VQihYCjEHKPj13Dhazz9b9ZTZKjsWwySRO/I2jfW7xfSb8OUsfxb:aE6bhfj4GBT2z95ZWnwy0O/I2jfW7BP2
Threatray 2'388 similar samples on MalwareBazaar
TLSH T1DE65D052B67C8737C0F24AFE9F4EB3E5590DBE705E18D4022AD87E8C9A36281781519F
TrID 30.5% (.SCR) Windows screen saver (13097/50/3)
24.5% (.EXE) Win64 Executable (generic) (10523/12/4)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win32 Executable (generic) (4505/5/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
104.223.35.34:2404

Intelligence


File Origin
# of uploads :
1
# of downloads :
303
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
B73135A05BA0CFC192C9A02C24733592.exe
Verdict:
Malicious activity
Analysis date:
2023-08-04 17:06:33 UTC
Tags:
dbatloader rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control keylogger lolbin packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1285876 Sample: Eu3k87iwJA.exe Startdate: 04/08/2023 Architecture: WINDOWS Score: 100 63 Snort IDS alert for network traffic 2->63 65 Multi AV Scanner detection for domain / URL 2->65 67 Found malware configuration 2->67 69 10 other signatures 2->69 10 Eu3k87iwJA.exe 1 7 2->10         started        process3 dnsIp4 57 web.fe.1drv.com 10->57 59 onedrive.live.com 10->59 61 2 other IPs or domains 10->61 45 C:\Users\Public\Libraries\netutils.dll, PE32+ 10->45 dropped 47 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 10->47 dropped 49 C:\Users\Public\Libraries\Qgydyqwy.PIF, PE32 10->49 dropped 73 Drops PE files with a suspicious file extension 10->73 75 Writes to foreign memory regions 10->75 77 Allocates memory in foreign processes 10->77 79 Injects a PE file into a foreign processes 10->79 15 cmd.exe 3 10->15         started        18 colorcpl.exe 5 15 10->18         started        file5 signatures6 process7 dnsIp8 81 Uses ping.exe to sleep 15->81 83 Drops executables to the windows directory (C:\Windows) and starts them 15->83 85 Uses ping.exe to check the status of other devices and networks 15->85 21 easinvoker.exe 15->21         started        23 PING.EXE 1 15->23         started        26 xcopy.exe 2 15->26         started        29 6 other processes 15->29 51 moneymagnetjoe.duckdns.org 104.223.35.34, 2404, 49704 ASN-QUADRANET-GLOBALUS United States 18->51 53 geoplugin.net 178.237.33.50, 49705, 80 ATOM86-ASATOM86NL Netherlands 18->53 signatures9 process10 dnsIp11 31 cmd.exe 1 21->31         started        55 127.0.0.1 unknown unknown 23->55 41 C:\Windows \System32\easinvoker.exe, PE32+ 26->41 dropped 43 C:\Windows \System32\netutils.dll, PE32+ 29->43 dropped file12 process13 signatures14 87 Suspicious powershell command line found 31->87 89 Adds a directory exclusion to Windows Defender 31->89 34 powershell.exe 21 31->34         started        37 conhost.exe 31->37         started        process15 signatures16 71 DLL side loading technique detected 34->71 39 conhost.exe 34->39         started        process17
Threat name:
Win32.Trojan.ModiLoader
Status:
Malicious
First seen:
2023-08-03 03:02:00 UTC
File Type:
PE (Exe)
Extracted files:
78
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:remotehost persistence rat trojan
Behaviour
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
moneymagnetjoe.duckdns.org:2404
Unpacked files
SH256 hash:
64a84bec84d96284205b8a487b36768a75c398e70b12ba590125570abff291bb
MD5 hash:
b73135a05ba0cfc192c9a02c24733592
SHA1 hash:
d641c490b93facf65216565fa791ac7b64026b73
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:CMD_Ping_Localhost
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_ModiLoader
Author:ditekSHen
Description:Detects ModiLoader
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments