MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 66e6c38dc2c5e1dc03209e8f876d546c94a1b806c6e02c3b33f5e523eb3fdff9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 5 File information Comments

SHA256 hash: 66e6c38dc2c5e1dc03209e8f876d546c94a1b806c6e02c3b33f5e523eb3fdff9
SHA3-384 hash: a61cc470c2b3c9a005103316f7384d099ccb59664b88a65645b8d7845dc80caa7425a8428cc2a56ec01154fb2be84aee
SHA1 hash: abc3b46626e17e22b744b9fe44833919255121ce
MD5 hash: b58e300ca8077adc4094e9044bcdbbc8
humanhash: white-timing-robert-west
File name:66e6c38dc2c5e1dc03209e8f876d546c94a1b806c6e02c3b33f5e523eb3fdff9
Download: download sample
Signature RemcosRAT
File size:2'652'160 bytes
First seen:2024-12-12 16:16:11 UTC
Last seen:2025-01-10 10:41:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fba9a06cd911d183f0aec1159c439b07 (1 x RemcosRAT)
ssdeep 24576:Mo48sSW8kD+xpdPChyjn4CqnlwRsdkoAgEsJUtDkMvF9Am:p4bIk6qhyL4osdkovEsJUFxPJ
TLSH T145C56CC6D940C847F97A19FDE91A78F0422F3FB9D93EA06B9B907F2DB231AC10415952
TrID 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.5% (.EXE) Win64 Executable (generic) (10522/11/4)
5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
File icon (PE):PE icon
dhash icon 1a79ccccccc86020 (1 x RemcosRAT)
Reporter JAMESWT_WT
Tags:181-131-217-244 exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
400
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://drive.google.com/open?id=1l8ClFtl6T5B1_ByESe_brOk2A4W7_hID
Verdict:
Malicious activity
Analysis date:
2024-12-10 22:50:56 UTC
Tags:
webdav loader purecrypter

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
shellcode virus sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Creating a file
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint microsoft_visual_cc redcap
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
evad.troj.spyw.expl
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Creates multiple autostart registry keys
Drops large PE files
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Suricata IDS alerts for network traffic
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573906 Sample: 4JwhvqLe8n.exe Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 26 s3-w.us-east-1.amazonaws.com 2->26 28 s3-1-w.amazonaws.com 2->28 30 5 other IPs or domains 2->30 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 10 other signatures 2->46 7 4JwhvqLe8n.exe 1 3 2->7         started        11 ccrdlld.exe 1 3 2->11         started        signatures3 process4 file5 20 C:\Users\user\Videos\...\OrionLegacyCLI.exe, PE32 7->20 dropped 48 Creates multiple autostart registry keys 7->48 50 Writes to foreign memory regions 7->50 52 Allocates memory in foreign processes 7->52 13 csc.exe 16 3 7->13         started        22 C:\Users\user\...\HardDiskSentinelBin.exe, PE32 11->22 dropped 54 Drops large PE files 11->54 56 Injects a PE file into a foreign processes 11->56 18 ccrdlld.exe 3 16 11->18         started        signatures6 process7 dnsIp8 32 newstaticfreepoint24.ddns-ip.net 181.131.217.244, 1842, 30203, 49743 EPMTelecomunicacionesSAESPCO Colombia 13->32 34 s3-w.us-east-1.amazonaws.com 3.5.24.44, 443, 49760 AMAZON-AESUS United States 13->34 36 bitbucket.org 185.166.143.49, 443, 49750 AMAZON-02US Germany 13->36 24 C:\Users\user\AppData\Local\...\ccrdlld.exe, PE32 13->24 dropped 58 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 13->58 38 geoplugin.net 178.237.33.50, 49850, 80 ATOM86-ASATOM86NL Netherlands 18->38 60 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 18->60 62 Installs a global keyboard hook 18->62 64 Found direct / indirect Syscall (likely to bypass EDR) 18->64 file9 signatures10
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2024-12-10 17:30:57 UTC
File Type:
PE (Exe)
Extracted files:
63
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Unpacked files
SH256 hash:
10ab33e00acd1ad2e05a40d194740fcafd86cdc8cc28244650ae48695f496f9c
MD5 hash:
e8d37eeaaa2f0fd2dcc4176172b7b375
SHA1 hash:
c6ebdb985fcdd49c3b3c61c5092a745d33cdeb7b
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
6586212eb8e529595385d0b10395a218c81c340ec24f1e9ffa5e65b8e49e513d
MD5 hash:
f11c7745280545073cfb4ad6c0e40286
SHA1 hash:
039b24d2071a7fe191ea970b92203623edba54f7
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
08d1dee9acb5a0c54c0436f39ab4ae0fea7f828cac0335c28f3c2f1ed872a9f6
MD5 hash:
186c829a59e8ba6335cd8242f15fedf1
SHA1 hash:
32fa9ba3650b125d8c9f94a016a0cd38cc9b56f2
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
66e6c38dc2c5e1dc03209e8f876d546c94a1b806c6e02c3b33f5e523eb3fdff9
MD5 hash:
b58e300ca8077adc4094e9044bcdbbc8
SHA1 hash:
abc3b46626e17e22b744b9fe44833919255121ce
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenSemaphoreW
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegOpenKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW

Comments