MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 75591cb23ef20e0a1bc8d01a392621d608b83ee25bcf37b330d3e966d2c8a50b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 75591cb23ef20e0a1bc8d01a392621d608b83ee25bcf37b330d3e966d2c8a50b
SHA3-384 hash: 44ed40e4ebf450686cb809584388b5f4e0595262ccbb63c0f467599a765cfd51f70ad71d490ff871c51cbd381ce2e86f
SHA1 hash: ca4d3fb640f12537fabe1eb107ef718b21c92c63
MD5 hash: 36909bb88f91e69d271e206ab3fa8f00
humanhash: florida-washington-london-table
File name:36909bb88f91e69d271e206ab3fa8f00.exe
Download: download sample
Signature RemcosRAT
File size:454'656 bytes
First seen:2021-09-01 18:35:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c4b3ef5cd2bacd05c5793b6be4b1aeae (4 x RemcosRAT)
ssdeep 6144:swnXSYbm2at3ZjyPt7Z3CZzw+38Pt7cjqJWa:bSwatJuP5N8H8P5cEWa
Threatray 5'083 similar samples on MalwareBazaar
TLSH T145A4B48E62484208F5A6FF71988D81F903316D31ADB6C44E17D9B13A0FFAAF59B17847
dhash icon 9ca2a393929a9a9a (4 x RemcosRAT)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
36909bb88f91e69d271e206ab3fa8f00.exe
Verdict:
No threats detected
Analysis date:
2021-09-01 18:38:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Threat name:
Remcos GuLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected Remcos RAT
Found malware configuration
GuLoader behavior detected
Hides threads from debuggers
Installs a global keyboard hook
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 476031 Sample: 5YPyFWLjhg.exe Startdate: 01/09/2021 Architecture: WINDOWS Score: 100 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Found malware configuration 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 6 other signatures 2->55 9 5YPyFWLjhg.exe 1 2->9         started        12 win.exe 1 2->12         started        14 win.exe 1 2->14         started        process3 signatures4 67 Tries to detect Any.run 9->67 69 Hides threads from debuggers 9->69 16 5YPyFWLjhg.exe 1 10 9->16         started        21 win.exe 1 8 12->21         started        23 win.exe 6 14->23         started        process5 dnsIp6 43 103.133.111.149, 49721, 49728, 49730 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 16->43 39 C:\Users\user\AppData\Roaming\win.exe, PE32 16->39 dropped 41 C:\Users\user\...\win.exe:Zone.Identifier, ASCII 16->41 dropped 57 Tries to detect Any.run 16->57 59 Hides threads from debuggers 16->59 25 cmd.exe 1 16->25         started        45 xp19.ddns.net 103.133.111.221, 1996, 49729 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 21->45 61 Installs a global keyboard hook 21->61 file7 signatures8 process9 signatures10 71 Uses ping.exe to sleep 25->71 73 Uses ping.exe to check the status of other devices and networks 25->73 28 win.exe 1 25->28         started        31 PING.EXE 1 25->31         started        34 conhost.exe 25->34         started        process11 dnsIp12 75 Multi AV Scanner detection for dropped file 28->75 77 Tries to detect Any.run 28->77 79 Hides threads from debuggers 28->79 36 win.exe 6 28->36         started        47 127.0.0.1 unknown unknown 31->47 signatures13 process14 signatures15 63 Tries to detect Any.run 36->63 65 Hides threads from debuggers 36->65
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2021-09-01 14:28:34 UTC
AV detection:
12 of 28 (42.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:host downloader persistence rat suricata
Behaviour
Runs ping.exe
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks QEMU agent file
Loads dropped DLL
Executes dropped EXE
Guloader,Cloudeye
Remcos
suricata: ET MALWARE Generic .bin download from Dotted Quad
suricata: ET MALWARE Remcos RAT Checkin 23
Malware Config
C2 Extraction:
xp19.ddns.net:1996
Unpacked files
SH256 hash:
49b04162c412105ab0857de16713724cbf3234a0b6ba51f3a5286312633f20c3
MD5 hash:
1f1b425190b2fb0396ad2d538b1060ba
SHA1 hash:
413f98641d46fdcabfcaf64f29495667de6282ea
SH256 hash:
75591cb23ef20e0a1bc8d01a392621d608b83ee25bcf37b330d3e966d2c8a50b
MD5 hash:
36909bb88f91e69d271e206ab3fa8f00
SHA1 hash:
ca4d3fb640f12537fabe1eb107ef718b21c92c63
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 75591cb23ef20e0a1bc8d01a392621d608b83ee25bcf37b330d3e966d2c8a50b

(this sample)

  
Delivery method
Distributed via web download

Comments