MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 72bb4a68f56282391552f33e3f32415ca046081b1823049778a6522f2d5f0e43. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 72bb4a68f56282391552f33e3f32415ca046081b1823049778a6522f2d5f0e43
SHA3-384 hash: 394dd377e73d88faa205904e09a5920ee24bc19a5e1feb88ce38bc2b2560c7395b5dd7aac56fd52536aeea51dca041ba
SHA1 hash: dbe730192e15e97e1e7cd2ad10789f461e12e205
MD5 hash: 5b6b523c7e728cf6afcea64f58efe0be
humanhash: sink-nevada-high-nineteen
File name:5b6b523c7e728cf6afcea64f58efe0be.exe
Download: download sample
Signature RemcosRAT
File size:203'672 bytes
First seen:2022-03-05 18:21:50 UTC
Last seen:2022-03-05 19:35:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a78d55f3f7af51443e58e0ce2fb5f6 (719 x GuLoader, 451 x Formbook, 295 x Loki)
ssdeep 3072:9vbG7N2kDTHUpouY7lMbOG7mhaOyt8hoVybG8auk2AaVkZoa2BPYRhPH:VbE/HUolM/mk38hom6h2AaVkZKBwRhf
Threatray 10'663 similar samples on MalwareBazaar
TLSH T16C14E00056A0F857C8A13630DC3696F5AA799D13C5B59B430B83FE6B3AFF28149DE126
File icon (PE):PE icon
dhash icon 71e0d4b4d4f4f071 (3 x RemcosRAT)
Reporter abuse_ch
Tags:exe RemcosRAT signed

Code Signing Certificate

Organisation:moraliteters
Issuer:moraliteters
Algorithm:sha256WithRSAEncryption
Valid from:2022-03-05T08:16:16Z
Valid to:2023-03-05T08:16:16Z
Serial number: 00
Intelligence: 325 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 1a41225ec86cff08d147b250f03da164ce3f707ce6ec57cd945ee9839692f2b1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
290
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a file
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader Remcos
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides threads from debuggers
Installs a global keyboard hook
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected GuLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 583717 Sample: G2v4mc745U.exe Startdate: 05/03/2022 Architecture: WINDOWS Score: 100 59 davidwongwarzone.zapto.org 2->59 69 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->69 71 Multi AV Scanner detection for domain / URL 2->71 73 Found malware configuration 2->73 75 10 other signatures 2->75 11 G2v4mc745U.exe 20 2->11         started        15 UDP.exe 17 2->15         started        17 cmd.exe 1 2->17         started        signatures3 process4 file5 53 C:\Users\user\AppData\Local\...\System.dll, PE32 11->53 dropped 55 C:\Users\user\AppData\Local\...xtExport.exe, PE32+ 11->55 dropped 95 Tries to detect Any.run 11->95 97 Hides threads from debuggers 11->97 19 G2v4mc745U.exe 4 10 11->19         started        57 C:\Users\user\AppData\Local\...\System.dll, PE32 15->57 dropped 24 UDP.exe 6 15->24         started        99 Uses ping.exe to sleep 17->99 26 conhost.exe 17->26         started        28 PING.EXE 1 17->28         started        signatures6 process7 dnsIp8 61 136.144.41.109, 49710, 49711, 49713 WORLDSTREAMNL Netherlands 19->61 47 C:\Users\user\AppData\Roaming\UDP.exe, PE32 19->47 dropped 49 C:\Users\user\...\UDP.exe:Zone.Identifier, ASCII 19->49 dropped 51 C:\Users\user\AppData\Local\...\install.vbs, data 19->51 dropped 85 Tries to detect Any.run 19->85 87 Hides threads from debuggers 19->87 30 wscript.exe 1 19->30         started        file9 signatures10 process11 process12 32 cmd.exe 1 30->32         started        signatures13 65 Uses ping.exe to sleep 32->65 67 Uses ping.exe to check the status of other devices and networks 32->67 35 UDP.exe 17 32->35         started        39 conhost.exe 32->39         started        process14 file15 45 C:\Users\user\AppData\Local\...\System.dll, PE32 35->45 dropped 77 Antivirus detection for dropped file 35->77 79 Multi AV Scanner detection for dropped file 35->79 81 Tries to detect Any.run 35->81 83 Hides threads from debuggers 35->83 41 UDP.exe 2 7 35->41         started        signatures16 process17 dnsIp18 63 davidwongwarzone.zapto.org 2.58.149.121, 2030, 49712 GBTCLOUDUS Netherlands 41->63 89 Tries to detect Any.run 41->89 91 Hides threads from debuggers 41->91 93 Installs a global keyboard hook 41->93 signatures19
Threat name:
Win32.Trojan.Shelsy
Status:
Malicious
First seen:
2022-03-05 16:34:55 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
13 of 27 (48.15%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:gee2022 downloader persistence rat suricata
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks QEMU agent file
Loads dropped DLL
Executes dropped EXE
Guloader,Cloudeye
Remcos
suricata: ET MALWARE Generic .bin download from Dotted Quad
Malware Config
C2 Extraction:
davidwongwarzone.zapto.org:2030
Unpacked files
SH256 hash:
72bb4a68f56282391552f33e3f32415ca046081b1823049778a6522f2d5f0e43
MD5 hash:
5b6b523c7e728cf6afcea64f58efe0be
SHA1 hash:
dbe730192e15e97e1e7cd2ad10789f461e12e205
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 72bb4a68f56282391552f33e3f32415ca046081b1823049778a6522f2d5f0e43

(this sample)

  
Delivery method
Distributed via web download

Comments