MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761
SHA3-384 hash: ddc244ec44e5be3c2672ccaf7ca72ddb249a48662d8e0ac9305c8922aaa3cd581a30472d99b7ff7e808fc123b5412f45
SHA1 hash: 69ec0031c63548a3cc97f6dc41e2ddc37d66283d
MD5 hash: 763134efe9251b8d14039a8ede9e9316
humanhash: finch-moon-september-tango
File name:king.cmd
Download: download sample
Signature RemcosRAT
File size:2'390'423 bytes
First seen:2025-07-12 06:54:12 UTC
Last seen:Never
File type:cmd cmd
MIME type:text/x-msdos-batch
ssdeep 24576:s26p2WCAI5DVMY+4BjBD9C42G2063u9ubrzO1jwWZ0fobC:s26oWCAIJjtU4o+r0OC
Threatray 4'134 similar samples on MalwareBazaar
TLSH T1B9B5C3E72DFD0686630427BF579FF9540B2BDC250BD22EC491C319D8A40E76B2960DAE
Magika txt
Reporter abuse_ch
Tags:cmd RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
SE SE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
phishing autorun delphi emotet
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Allocates many large memory junks
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Detected Remcos RAT
Disables UAC (registry)
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found malware configuration
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Registers a new ROOT certificate
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DBatLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1734605 Sample: king.cmd Startdate: 12/07/2025 Architecture: WINDOWS Score: 100 80 logscomenow.sbs 2->80 82 hbws.cc 2->82 84 geoplugin.net 2->84 108 Suricata IDS alerts for network traffic 2->108 110 Found malware configuration 2->110 112 Malicious sample detected (through community Yara rule) 2->112 114 8 other signatures 2->114 10 cmd.exe 1 2->10         started        12 rundll32.exe 3 2->12         started        signatures3 process4 process5 14 msvcr90.exe 7 10->14         started        19 txtu.com 1 10->19         started        21 extrac32.exe 1 10->21         started        25 6 other processes 10->25 23 Cgdqgnvk.PIF 12->23         started        dnsIp6 88 hbws.cc 185.208.158.17, 443, 49687, 49688 SIMPLECARRER2IT Switzerland 14->88 68 C:\Users\user\Links\Cgdqgnvk.PIF (copy), PE32 14->68 dropped 94 Early bird code injection technique detected 14->94 96 Allocates memory in foreign processes 14->96 98 Allocates many large memory junks 14->98 100 Queues an APC in another process (thread injection) 14->100 27 cmd.exe 1 14->27         started        30 SndVol.exe 14->30         started        34 cmd.exe 1 14->34         started        36 cmd.exe 1 14->36         started        70 C:\ProgramData\amsi.dll, PE32 19->70 dropped 102 Drops PE files with a suspicious file extension 19->102 104 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 19->104 72 C:\ProgramData\txtu.com, PE32 21->72 dropped 38 SndVol.exe 23->38         started        74 C:\ProgramData\msvcr90.exe, PE32 25->74 dropped 76 C:\ProgramDatabehaviorgraphesk.com, PE32 25->76 dropped 106 Registers a new ROOT certificate 25->106 file7 signatures8 process9 dnsIp10 122 Uses ping.exe to sleep 27->122 124 Uses schtasks.exe or at.exe to add and modify task schedules 27->124 126 Uses ping.exe to check the status of other devices and networks 27->126 40 esentutl.exe 2 27->40         started        44 conhost.exe 27->44         started        46 alpha.pif 27->46         started        48 alpha.pif 27->48         started        90 logscomenow.sbs 198.135.49.79, 2490, 49692 CISCOSYSTEMSUS United States 30->90 92 geoplugin.net 178.237.33.50, 49693, 80 ATOM86-ASATOM86NL Netherlands 30->92 78 C:\ProgramData\remcos\logs.dat, data 30->78 dropped 128 Detected Remcos RAT 30->128 130 Installs a global keyboard hook 30->130 50 cmd.exe 30->50         started        52 PING.EXE 1 34->52         started        55 conhost.exe 34->55         started        57 conhost.exe 36->57         started        59 schtasks.exe 1 36->59         started        file11 signatures12 process13 dnsIp14 66 C:\Users\Public\alpha.pif, PE32 40->66 dropped 116 Drops PE files to the user root directory 40->116 118 Drops PE files with a suspicious file extension 40->118 120 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 40->120 61 reg.exe 50->61         started        64 conhost.exe 50->64         started        86 127.0.0.1 unknown unknown 52->86 file15 signatures16 process17 signatures18 132 Disables UAC (registry) 61->132
Threat name:
Script-BAT.Dropper.Heuristic
Status:
Malicious
First seen:
2025-07-12 00:57:46 UTC
AV detection:
8 of 37 (21.62%)
Threat level:
  2/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader defense_evasion discovery execution persistence trojan
Behaviour
Kills process with taskkill
Modifies registry key
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Script User-Agent
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
System Binary Proxy Execution: ScriptRunner
Executes dropped EXE
Manipulates Digital Signatures
ModiLoader Second Stage
ModiLoader, DBatLoader
Modiloader family
UAC bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BAT_DbatLoader
Author:NDA0E
Description:Detects base64 and hex encoded MZ header used by DbatLoader
Rule name:BAT_Obfuscated_SetEnv
Author:marcin@ulikowski.pl
Description:Detects batch script with obfuscated SET command located directly after @echo off
Reference:https://twitter.com/wdormann/status/1651631372438585344
Rule name:dbatloader_bat_v2
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

cmd cmd 70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761

(this sample)

  
Delivery method
Distributed via web download

Comments