MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 73ffa57145be2aa80790a767193c2a81091e3540e3269474740a315d074496a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Maldoc score: 5


Intelligence 10 IOCs YARA 15 File information Comments

SHA256 hash: 73ffa57145be2aa80790a767193c2a81091e3540e3269474740a315d074496a3
SHA3-384 hash: ed11eaee01df879e5169fb3337d1fdfa7b1c4bc38ed9c6f9d5f221763fbde36f4f38ebba055310d3ae3e3fb32bfd97ad
SHA1 hash: 292d15f9fdd114b4ec45f10b28dcf11f49e6b612
MD5 hash: 20e59a772c6e5623c4943e1d56d1f8ef
humanhash: carolina-tango-five-indigo
File name:POD.xls
Download: download sample
Signature RemcosRAT
File size:214'528 bytes
First seen:2021-02-16 06:35:57 UTC
Last seen:2021-02-16 09:01:18 UTC
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 6144:Tk3hbdlylKsgqopeJBWhZFVE+W2NdA8y8iCRLPCVOwcaB1sX1kDee1x:/8LPCVOg45gx
TLSH 6E24BD47A8499E97F549C3B4FF560E293B12AE58F89736FA06013EC62F74A904C4613F
Reporter abuse_ch
Tags:HostGator RAT RemcosRAT xls


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: gateway22.websitewelcome.com
Sending IP: 192.185.47.228
From: VANGIE HILIG <mlkp4@mlhuillier.com>
Reply-To: skydengroup@protonmail.com
Subject: Proof of Payment for your reference
Attachment: POD.xls

RemcosRAT payload URL:
https://cdn.discordapp.com/attachments/804088489854369795/810984346428899328/Qescymij.exe

RemcosRAT C2:
skyden.awsmppl.com:24046 (46.173.211.171)

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 5
Application name is Microsoft Excel
Office document is in OLE format
OLE dump

MalwareBazaar was able to identify 3 sections in this file using oledump:

Section IDSection sizeSection name
14096 bytesDocumentSummaryInformation
24096 bytesSummaryInformation
3202914 bytesWorkbook
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecAuto_OpenRuns when the Excel Workbook is opened
SuspiciousEXECMay run an executable file or a system
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
2
# of downloads :
128
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
File type:
application/vnd.ms-excel
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Creating a file
Moving a file to the %AppData% directory
Creating a process from a recently created file
Launching a process by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Legacy Office File
Document image
Document image
Result
Verdict:
MALICIOUS
Result
Threat name:
Hidden Macro 4.0 Remcos
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Connects to a URL shortener service
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Document exploit detected (process start blacklist hit)
Drops PE files to the document folder of the user
Found Excel 4.0 Macro with suspicious formulas
Found obfuscated Excel 4.0 Macro
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Powershell drops PE file
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Powershell downloading file from url shortener site
Sigma detected: Suspicious Program Location Process Starts
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 353366 Sample: POD.xls Startdate: 16/02/2021 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 Sigma detected: Powershell downloading file from url shortener site 2->56 58 14 other signatures 2->58 8 EXCEL.EXE 84 29 2->8         started        11 Qescyest.exe 2->11         started        13 Qescyest.exe 2->13         started        process3 signatures4 64 Obfuscated command line found 8->64 66 Document exploit detected (process start blacklist hit) 8->66 15 powershell.exe 7 8->15         started        17 powershell.exe 16 7 8->17         started        22 powershell.exe 7 8->22         started        68 Multi AV Scanner detection for dropped file 11->68 70 Detected unpacking (changes PE section rights) 11->70 72 Detected unpacking (overwrites its own PE header) 11->72 76 5 other signatures 11->76 24 Qescyest.exe 11->24         started        74 Injects a PE file into a foreign processes 13->74 26 Qescyest.exe 13->26         started        process5 dnsIp6 28 gb.exe 1 16 15->28         started        42 cdn.discordapp.com 162.159.129.233, 443, 49168 CLOUDFLARENETUS United States 17->42 44 tinyurl.com 172.67.1.225, 443, 49167 CLOUDFLARENETUS United States 17->44 36 C:\Users\user\Documents\gb.exe, PE32 17->36 dropped 60 Drops PE files to the document folder of the user 17->60 62 Powershell drops PE file 17->62 file7 signatures8 process9 dnsIp10 48 162.159.133.233, 443, 49169 CLOUDFLARENETUS United States 28->48 50 cdn.discordapp.com 28->50 38 C:\Users\Public\Libraries\Qescyest.exe, PE32 28->38 dropped 40 C:\Users\Public\Libraries\Qescy, ASCII 28->40 dropped 78 Detected unpacking (changes PE section rights) 28->78 80 Detected unpacking (overwrites its own PE header) 28->80 82 Contains functionality to steal Chrome passwords or cookies 28->82 84 6 other signatures 28->84 33 gb.exe 2 3 28->33         started        file11 signatures12 process13 dnsIp14 46 skyden.awsmppl.com 46.173.211.171, 24046, 49170 GARANT-PARK-INTERNETRU Russian Federation 33->46
Threat name:
Document-Word.Downloader.EncDoc
Status:
Malicious
First seen:
2021-02-16 06:36:11 UTC
AV detection:
17 of 47 (36.17%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos macro persistence rat xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
Process spawned unexpected child process
Remcos
Malware Config
Dropper Extraction:
https://tinyurl.com/1na4z0gm
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:Excel_Hidden_Macro_Sheet
Rule name:INDICATOR_OLE_Excel4Macros_DL2
Author:ditekSHen
Description:Detects OLE Excel 4 Macros documents acting as downloaders
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:SUSP_Excel4Macro_AutoOpen
Author:John Lambert @JohnLaTwC
Description:Detects Excel4 macro use with auto open / close
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Excel file xls 73ffa57145be2aa80790a767193c2a81091e3540e3269474740a315d074496a3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments