MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6c8a5f43e07034d0545c60c137f96c6ab8da44cfd59a8654896c8f6c497aefad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemoteManipulator
Vendor detections: 8
| SHA256 hash: | 6c8a5f43e07034d0545c60c137f96c6ab8da44cfd59a8654896c8f6c497aefad |
|---|---|
| SHA3-384 hash: | 372477f16846d8949dd5c7e620556a1bf41cdb88aabbdcab0312653bc513b06d8d00b3f7c4c7510a4b7ac1e1778e8111 |
| SHA1 hash: | 77ca0c3b15f33f96169af1db5b6325ef84a44898 |
| MD5 hash: | 81f327ba23b03e261a0bcb3b4be3ffb4 |
| humanhash: | missouri-idaho-lactose-lemon |
| File name: | Build.exe |
| Download: | download sample |
| Signature | RemoteManipulator |
| File size: | 4'563'924 bytes |
| First seen: | 2020-11-12 15:00:36 UTC |
| Last seen: | 2024-07-24 15:30:09 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e9c0657252137ac61c1eeeba4c021000 (53 x GuLoader, 26 x RedLineStealer, 17 x AgentTesla) |
| ssdeep | 98304:yMMMMMMSLLLLLLLPwt775WLYyN0YAyb9en/XI/dFpZkwBjwzX8dBziW0:3wt/K0Znvk0OjemO |
| Threatray | 8 similar samples on MalwareBazaar |
| TLSH | C02612C3F760051AF9AF47B292F35E1C992AEEFC9B65230A0CE033167563857196B487 |
| Reporter | |
| Tags: | exe RemoteManipulator |
Intelligence
File Origin
# of uploads :
2
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Creating a window
Launching a service
DNS request
Sending a custom TCP request
Creating a file
Delayed writing of the file
Running batch commands
Creating a process with a hidden window
Launching a process
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RMSRemoteAdmin
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
Threat name:
Win32.Hacktool.AutoKMS
Status:
Malicious
First seen:
2020-11-03 14:17:50 UTC
File Type:
PE (Exe)
Extracted files:
198
AV detection:
16 of 29 (55.17%)
Threat level:
1/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
Result
Malware family:
n/a
Score:
10/10
Tags:
persistence upx
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Drops file in Program Files directory
Adds Run key to start application
JavaScript code in executable
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
UPX packed file
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
6c8a5f43e07034d0545c60c137f96c6ab8da44cfd59a8654896c8f6c497aefad
MD5 hash:
81f327ba23b03e261a0bcb3b4be3ffb4
SHA1 hash:
77ca0c3b15f33f96169af1db5b6325ef84a44898
SH256 hash:
ea8b94e4caacd9881f5fdd77b1d9682227aabcae6e844a50cc09629f146b5f22
MD5 hash:
7546c1ada44e5791e00187a2a923f548
SHA1 hash:
9cae869e7676b9be747536dbee4eb6cc068dda79
SH256 hash:
89f26b20e4ff940d9fb76a99128178b22e69d84550a163b0d27804c790c77efe
MD5 hash:
fa6354a3f0dfe601610a06be6b64c051
SHA1 hash:
166312cfc636da57e220f4c6f70f5224ac30b1a6
Detections:
win_rms_a0
win_rms_auto
SH256 hash:
a6fe62d19b2b0f608fe3367ba5612742b9ff248b91a32b13fe189c891a22a00d
MD5 hash:
729168d16501390f6b7d92edb38886c4
SHA1 hash:
d244dc2a6325b22a02372c2b8e01ef4a3e51d10c
SH256 hash:
2e204ee4f1d12b4ca35c8205cea0cabe354f2e79a471863cfb76a7cee83cf107
MD5 hash:
69f2e8c6fd141e9e720b2c4c366a8154
SHA1 hash:
a6279d93a102b6d7608dced32a36ddcd3e51994c
SH256 hash:
0fb36a2a660dd899daf6eeb5d46f28d998d0b9afb53ded89f47bc03936e06aff
MD5 hash:
528ec935c96a89aec500bc27c13536c2
SHA1 hash:
9285ce32249377d5f9d8640de364771dd935e344
SH256 hash:
8c788a09ccce42ef39f707477ec6f38a3f7a3b18c5751b4580ab787766e8baac
MD5 hash:
fe7135eb0e80228905b3c1116923eef7
SHA1 hash:
5aaa7e7f78e91ede83dd075b58b1a01aa98fb21b
SH256 hash:
49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
MD5 hash:
293165db1e46070410b4209519e67494
SHA1 hash:
777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SH256 hash:
d6ce372acacf988f845b1bd35a876a1c1da19316efca4c6990e0f9ac6f0853e4
MD5 hash:
9b54944ce476591d65288b0701a52c46
SHA1 hash:
df1754c7714cbc7a40a281318b726629c348ee23
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.