MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 654dcb8cbaca77d6679523c36f44ea656e39a97ce7e4d6f91b089fe8d54f9787. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 4


Intelligence 4 IOCs YARA 2 File information Comments

SHA256 hash: 654dcb8cbaca77d6679523c36f44ea656e39a97ce7e4d6f91b089fe8d54f9787
SHA3-384 hash: 636bd1027d6a149ef7ae22e25306ae29e9285fb879355c5cda694bbb1fcd7c80e2163ddde17858b3db3ecf0ceb73ac2a
SHA1 hash: 9604593411ec85d7ca7ca5e12dad5e626a3fea10
MD5 hash: 2973191282734f786aa482df0bf9bc61
humanhash: sad-queen-pennsylvania-video
File name:Payment Slip Invoice 154-pdf.exe
Download: download sample
Signature RemcosRAT
File size:1'188'352 bytes
First seen:2020-05-20 17:47:12 UTC
Last seen:2020-05-21 08:04:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bdaba7e33391c6a591b557693e8203c7 (3 x RemcosRAT, 1 x AveMariaRAT)
ssdeep 24576:d01xAsrWCaJ67REfnnaTOs4tYj+RgUmCe/wA3:2cDCdLTOsIovUmCS
Threatray 1'033 similar samples on MalwareBazaar
TLSH A3459F21F5E28437D273593B9E0B9634A826BF411E3759993ADC3C4CDB7B3423639292
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: node.com
Sending IP: 173.82.202.166
From: Anderson K<anderson@tammynpeterson.us>
Subject: Payment for Invoce N.154
Attachment: Payment Slip Invoice 154-pdf.gz (contains "Payment Slip Invoice 154-pdf.exe")

Intelligence


File Origin
# of uploads :
3
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2020-05-20 18:35:40 UTC
File Type:
PE (Exe)
Extracted files:
23
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Script User-Agent
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 654dcb8cbaca77d6679523c36f44ea656e39a97ce7e4d6f91b089fe8d54f9787

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments