MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74615bedcd52ff089b0ed9dede11c46cd27de39b0b52c309ad71175e79e53868. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 74615bedcd52ff089b0ed9dede11c46cd27de39b0b52c309ad71175e79e53868
SHA3-384 hash: 76ed50c067e28fbbb1620da459ae59ffcc742903f1810180c2f5c3702a1ede751dfcd6d636b07c43a4c310293711492e
SHA1 hash: 4ca54d94edec79b304a6b4d85e7d5d0dc87407ac
MD5 hash: d516c57c54c6c65ff050e16e871e71e2
humanhash: snake-william-fillet-happy
File name:PDA ORDER.exe
Download: download sample
Signature RemcosRAT
File size:433'152 bytes
First seen:2021-08-10 09:06:12 UTC
Last seen:2021-08-11 12:50:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:IHbY645rq7qbvKZKgOxJY+zzqArh0VuWPzvgY+u3j+B8wsOcBtSoA:gtQTbCKDRaOhGzvdxT+BVsOcD
Threatray 2'969 similar samples on MalwareBazaar
TLSH T1C6948C3F1154821BF57CD27C2968125BF268DFC2F0DDE996E8D73586CA72A0326C426E
dhash icon 74f0dcccccd4c0d4 (10 x AgentTesla, 6 x RemcosRAT, 5 x BitRAT)
Reporter cocaman
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
123
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PDA ORDER.exe
Verdict:
Malicious activity
Analysis date:
2021-08-10 09:09:34 UTC
Tags:
rat remcos trojan asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a window
Sending a UDP request
Launching a process
Creating a process with a hidden window
Running batch commands
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos AsyncRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture and log keystrokes
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Drops PE files with benign system names
Found malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 462460 Sample: PDA ORDER.exe Startdate: 10/08/2021 Architecture: WINDOWS Score: 100 74 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->74 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 20 other signatures 2->80 9 PDA ORDER.exe 6 2->9         started        12 mstsc.exe 2->12         started        14 mstsc.exe 2->14         started        process3 file4 64 C:\Users\user\AppData\...\KHkWwNhPvyrETo.exe, PE32 9->64 dropped 66 C:\Users\user\AppData\Local\Temp\tmpF4A.tmp, XML 9->66 dropped 68 C:\Users\user\AppData\...\PDA ORDER.exe.log, ASCII 9->68 dropped 16 PDA ORDER.exe 3 9->16         started        19 schtasks.exe 1 9->19         started        process5 file6 54 C:\Users\user\AppData\Local\Temp\BB.exe, PE32 16->54 dropped 56 C:\Users\user\AppData\Local\Temp\Ab.exe, PE32 16->56 dropped 21 BB.exe 1 4 16->21         started        25 Ab.exe 7 16->25         started        27 conhost.exe 19->27         started        process7 file8 58 C:\Users\user\AppData\Roaming\...\mstsc.exe, PE32 21->58 dropped 90 Antivirus detection for dropped file 21->90 92 Machine Learning detection for dropped file 21->92 94 Contains functionality to detect virtual machines (IN, VMware) 21->94 98 4 other signatures 21->98 29 cmd.exe 1 21->29         started        60 C:\Users\user\AppData\Roaming\svchost.exe, PE32 25->60 dropped 62 C:\Users\user\AppData\...\tmpFD58.tmp.bat, DOS 25->62 dropped 96 Drops PE files with benign system names 25->96 32 cmd.exe 1 25->32         started        34 cmd.exe 1 25->34         started        signatures9 process10 signatures11 100 Uses ping.exe to sleep 29->100 102 Uses ping.exe to check the status of other devices and networks 29->102 36 mstsc.exe 1 3 29->36         started        40 PING.EXE 1 29->40         started        42 conhost.exe 29->42         started        44 svchost.exe 32->44         started        46 conhost.exe 32->46         started        48 timeout.exe 32->48         started        50 conhost.exe 34->50         started        52 schtasks.exe 34->52         started        process12 dnsIp13 70 194.5.98.81, 2510, 49763, 49774 DANILENKODE Netherlands 36->70 82 Antivirus detection for dropped file 36->82 84 Machine Learning detection for dropped file 36->84 86 Contains functionality to steal Chrome passwords or cookies 36->86 88 3 other signatures 36->88 72 127.0.0.1 unknown unknown 40->72 signatures14
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-10 06:10:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
14 of 45 (31.11%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:remcos botnet:host persistence rat suricata
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Async RAT payload
AsyncRat
Remcos
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Remcos RAT Checkin 23
Malware Config
C2 Extraction:
127.0.0.1:2510
194.5.98.81:2510
194.5.98.81:7123
Unpacked files
SH256 hash:
40a27f44ac166304eecfedafcb110cd7fb04ffa9f6fa4a7e7bd62d6443e9b6c7
MD5 hash:
c36bdf932b09a002f69dd1f4377a9d0e
SHA1 hash:
f8a60dfaf935e83083d05f8afa933ee7136093f9
Detections:
win_asyncrat_w0 win_remcos_g0 win_remcos_auto
SH256 hash:
71a494e1630183005e23ed9edd5b7966f3a1447efcb1c0bfa5707643f19f8f73
MD5 hash:
b18a7e85eb1575121f28b84529a41c93
SHA1 hash:
a790e4a95f3d58ac4a0227aeb5a719859275796a
SH256 hash:
ab63fbbedf5b5ad5be373fb11ee84284efca4a58f6a34e0c3d6b885c16a81fbe
MD5 hash:
855075698e4f11e8089f881c4b0237f8
SHA1 hash:
972785092ec9ba946fa90ad50198bc6f7bf5b234
Detections:
win_asyncrat_w0
SH256 hash:
b9ed93d47b330dde60ea5dcade34f6d5a250234887b8b7ef78ca03ce36f62a7a
MD5 hash:
d02d8a4dccc972c5cd8eb66e882db7d9
SHA1 hash:
58ae4164738c3c35eb27f7786b5664a3be68dcb9
SH256 hash:
1d99246378ccf15778bd36cc3d85b09a6e53581c4cff5f441cc520dfb99896df
MD5 hash:
c8b3a05b20c5bdc2909cd4ec7e8509f3
SHA1 hash:
4797b824d0729d77b7d949e69819c36fa0bc0c15
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
74615bedcd52ff089b0ed9dede11c46cd27de39b0b52c309ad71175e79e53868
MD5 hash:
d516c57c54c6c65ff050e16e871e71e2
SHA1 hash:
4ca54d94edec79b304a6b4d85e7d5d0dc87407ac
Malware family:
AsyncRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 74615bedcd52ff089b0ed9dede11c46cd27de39b0b52c309ad71175e79e53868

(this sample)

Comments