MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6e64f1c66b67d4912394403d99b88da47f28f0a682e17c94af69b8f59221d6be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 6e64f1c66b67d4912394403d99b88da47f28f0a682e17c94af69b8f59221d6be
SHA3-384 hash: 70bee45779081b588bd74b05426e960edbad1cc92e22c316826d85ab3136eed0f22815aa9b6cb7c3caccc1b7e9f60ce5
SHA1 hash: 97f764fe97110aa8f53dc9e4237e31b4d1799aa1
MD5 hash: 35d7127e414b4a381a0a7eb07a682c00
humanhash: lactose-seven-mike-friend
File name:35d7127e414b4a381a0a7eb07a682c00.exe
Download: download sample
Signature RemcosRAT
File size:1'497'296 bytes
First seen:2020-12-16 08:07:37 UTC
Last seen:2020-12-16 09:45:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:5PVixdNcsfp0A2+Nszzn0NeTuaTTMRXXezrV8:eGLJMBGq
Threatray 1'222 similar samples on MalwareBazaar
TLSH 7A657D54BC10355FAA8A41F499DB66ECF2DA300966362B198C23657CC92D187BCDFCB3
Reporter abuse_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
35d7127e414b4a381a0a7eb07a682c00.exe
Verdict:
Malicious activity
Analysis date:
2020-12-16 08:09:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Sending a UDP request
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Launching cmd.exe command interpreter
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
Setting a keyboard event handler
DNS request
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the User Account Control
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates an autostart registry key pointing to binary in C:\Windows
Detected Remcos RAT
Detected unpacking (creates a PE file in dynamic memory)
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 331101 Sample: n42vbcHN3A.exe Startdate: 16/12/2020 Architecture: WINDOWS Score: 100 72 cdn.onenote.net 2->72 78 Malicious sample detected (through community Yara rule) 2->78 80 Multi AV Scanner detection for dropped file 2->80 82 Multi AV Scanner detection for submitted file 2->82 84 10 other signatures 2->84 12 n42vbcHN3A.exe 3 2->12         started        16 Windows Start-Up Audio.exe 2 2->16         started        18 Windows Start-Up Audio.exe 2 2->18         started        signatures3 process4 file5 70 C:\Users\user\AppData\...\n42vbcHN3A.exe.log, ASCII 12->70 dropped 100 Contains functionality to detect virtual machines (IN, VMware) 12->100 102 Contains functionality to steal Chrome passwords or cookies 12->102 104 Contains functionality to capture and log keystrokes 12->104 110 2 other signatures 12->110 20 n42vbcHN3A.exe 1 5 12->20         started        24 Windows Start-Up Audio.exe 3 16->24         started        106 Drops executables to the windows directory (C:\Windows) and starts them 18->106 108 Injects a PE file into a foreign processes 18->108 27 Windows Start-Up Audio.exe 18->27         started        signatures6 process7 dnsIp8 64 C:\Windows\...\Windows Start-Up Audio.exe, PE32 20->64 dropped 66 Windows Start-Up A...exe:Zone.Identifier, ASCII 20->66 dropped 94 Creates an autostart registry key pointing to binary in C:\Windows 20->94 29 cmd.exe 1 20->29         started        32 cmd.exe 1 20->32         started        76 arttronova1.duckdns.org 185.244.30.86, 49760, 6065 DAVID_CRAIGGG Netherlands 24->76 96 Installs a global keyboard hook 24->96 34 cmd.exe 1 24->34         started        file9 signatures10 process11 signatures12 112 Uses ping.exe to sleep 29->112 36 Windows Start-Up Audio.exe 3 29->36         started        39 PING.EXE 1 29->39         started        42 conhost.exe 29->42         started        114 Uses cmd line tools excessively to alter registry or file data 32->114 44 conhost.exe 32->44         started        46 reg.exe 1 32->46         started        48 conhost.exe 34->48         started        50 reg.exe 1 34->50         started        process13 dnsIp14 68 C:\Users\...\Windows Start-Up Audio.exe.log, ASCII 36->68 dropped 52 Windows Start-Up Audio.exe 2 1 36->52         started        74 127.0.0.1 unknown unknown 39->74 file15 process16 signatures17 86 Detected Remcos RAT 52->86 88 Writes to foreign memory regions 52->88 90 Allocates memory in foreign processes 52->90 92 Injects a PE file into a foreign processes 52->92 55 cmd.exe 1 52->55         started        58 iexplore.exe 52->58         started        process18 signatures19 98 Uses cmd line tools excessively to alter registry or file data 55->98 60 conhost.exe 55->60         started        62 reg.exe 1 55->62         started        process20
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2020-12-16 06:16:18 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos evasion persistence rat trojan
Behaviour
Modifies registry key
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
UAC bypass
Malware Config
C2 Extraction:
arttronova1.duckdns.org:6065
Unpacked files
SH256 hash:
6e64f1c66b67d4912394403d99b88da47f28f0a682e17c94af69b8f59221d6be
MD5 hash:
35d7127e414b4a381a0a7eb07a682c00
SHA1 hash:
97f764fe97110aa8f53dc9e4237e31b4d1799aa1
SH256 hash:
85ee9f9be6e324bb3bbd872d91c83ef5184efe03eeae571ee54640b19359cc91
MD5 hash:
4f9a1ccfc5515c5f74cc242e6983f40c
SHA1 hash:
7afc48eab3909ad160b3a8f46d730d9a362e99d0
SH256 hash:
17a1953efd82e7ae30c3a209e1baa214cdabf227883cfe705f2b7819f04a7a20
MD5 hash:
07c63d09c99e4a74918c7f5046fad55c
SHA1 hash:
8740a6cb15bdc73c91f0d928d0f86c8e4c6baeea
Detections:
win_remcos_g0 win_remcos_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 6e64f1c66b67d4912394403d99b88da47f28f0a682e17c94af69b8f59221d6be

(this sample)

  
Delivery method
Distributed via web download

Comments