MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64f8d40a94818b9385624dc6237edee725cc7edf78c09da9fd60454a7b1e2cdc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 64f8d40a94818b9385624dc6237edee725cc7edf78c09da9fd60454a7b1e2cdc
SHA3-384 hash: de6c8ec2c586afbc7e26cbfe216469ffd2ce71c9e13f2c0572215b458f782f5b45f7680437623a4750d1fc3f1e8ed73c
SHA1 hash: f284046c61b75fd44bf55661701c5e15b97efb28
MD5 hash: 8b5f64100174bb8bafd5ad78d6f2b277
humanhash: freddie-arizona-shade-april
File name:Main_Order.vbs
Download: download sample
Signature RemcosRAT
File size:963 bytes
First seen:2025-03-30 18:31:29 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:CqakQ+oW0KHFZJVDBF76LKhPjkcwFqrmTKC:hD0sFZJHFG+pY3/
Threatray 769 similar samples on MalwareBazaar
TLSH T1FA11EDAFDC2BC2811DB11955D6AC8A28EE6392072226C429796CDC0B9B301BDD1755A7
Magika vba
Reporter abuse_ch
Tags:RemcosRAT vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
dropper shell spawn
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dropper masquerade obfuscated packed powershell
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Detected Remcos RAT
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Potential malicious VBS script found (has network functionality)
Powershell drops PE file
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1652285 Sample: Main_Order.vbs Startdate: 30/03/2025 Architecture: WINDOWS Score: 100 71 sinoveo.com 2->71 81 Suricata IDS alerts for network traffic 2->81 83 Found malware configuration 2->83 85 Malicious sample detected (through community Yara rule) 2->85 87 13 other signatures 2->87 12 wscript.exe 15 2->12         started        17 process.exe 2->17         started        19 gFnEPEuEhX.exe 3 2->19         started        signatures3 process4 dnsIp5 73 sinoveo.com 192.121.162.80, 49695, 80 NFORCENL Sweden 12->73 63 C:\Users\user\...\DownloadedScript.ps1, ASCII 12->63 dropped 101 System process connects to network (likely due to code injection or exploit) 12->101 103 VBScript performs obfuscated calls to suspicious functions 12->103 105 Wscript starts Powershell (via cmd or directly) 12->105 109 3 other signatures 12->109 21 powershell.exe 13 12->21         started        107 Injects a PE file into a foreign processes 17->107 25 process.exe 17->25         started        27 schtasks.exe 17->27         started        file6 signatures7 process8 file9 59 C:\Users\user\AppData\Local\...\tmp3A0C.exe, PE32 21->59 dropped 89 Found suspicious powershell code related to unpacking or dynamic code loading 21->89 91 Powershell drops PE file 21->91 29 tmp3A0C.exe 6 21->29         started        33 conhost.exe 21->33         started        93 Detected Remcos RAT 25->93 35 conhost.exe 27->35         started        signatures10 process11 file12 65 C:\Users\user\AppData\Local\...\tmp8B39.tmp, XML 29->65 dropped 67 C:\Users\user\AppData\...\gFnEPEuEhX.exe, PE32 29->67 dropped 111 Contains functionality to bypass UAC (CMSTPLUA) 29->111 113 Contains functionalty to change the wallpaper 29->113 115 Contains functionality to steal Chrome passwords or cookies 29->115 117 3 other signatures 29->117 37 tmp3A0C.exe 2 3 29->37         started        41 schtasks.exe 1 29->41         started        signatures13 process14 file15 61 C:\ProgramData\Tencent\process.exe, PE32 37->61 dropped 95 Detected Remcos RAT 37->95 97 Creates autostart registry keys with suspicious names 37->97 43 process.exe 5 37->43         started        46 conhost.exe 41->46         started        signatures16 process17 signatures18 99 Injects a PE file into a foreign processes 43->99 48 process.exe 43->48         started        53 schtasks.exe 1 43->53         started        process19 dnsIp20 69 103.28.89.34, 10101 AMARUTU-TECHNOLOGYNL Malaysia 48->69 57 C:\ProgramData\remcos\logs.dat, data 48->57 dropped 75 Detected Remcos RAT 48->75 77 Tries to harvest and steal browser information (history, passwords, etc) 48->77 79 Installs a global keyboard hook 48->79 55 conhost.exe 53->55         started        file21 signatures22 process23
Threat name:
Script-WScript.Backdoor.Remcos
Status:
Suspicious
First seen:
2025-03-30 16:30:49 UTC
File Type:
Text (VBS)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:thales 10101 discovery execution persistence rat
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Remcos
Remcos family
Malware Config
C2 Extraction:
103.28.89.34:10101
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments