MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 778ad2e8d477b0fc3ba8cbb0e3de025a6f101257c67efeb60f2bc5627996e028. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 778ad2e8d477b0fc3ba8cbb0e3de025a6f101257c67efeb60f2bc5627996e028
SHA3-384 hash: e6f0bb46ac26cccbf21a00f5471b7eabf14e4ef9ee2fb237618415888325d9bb999a96144deb1b555582d09987377949
SHA1 hash: 9a167bfba1a74041f7dd0728b32205a4552e1b5c
MD5 hash: 2d9b808a09cc50bf8cf027b71bb20d1e
humanhash: cola-mississippi-skylark-one
File name:2d9b808a09cc50bf8cf027b71bb20d1e.exe
Download: download sample
Signature RemcosRAT
File size:1'051'648 bytes
First seen:2023-01-10 19:05:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:HIO/padyi/u8dCLF0XA82KwJEO7yeJqNuilb7qEZV/NWCsgfzG:Bpa/td9Xp2KwJEOwNtqEZVugf
Threatray 4'184 similar samples on MalwareBazaar
TLSH T11525121526F9A81EFD7D93FB5611DA9403B4A3218749E2DD0DEB23CBCAF87295207213
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 00c0c8c1e6789842 (4 x AgentTesla, 3 x RemcosRAT, 1 x SnakeKeylogger)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2d9b808a09cc50bf8cf027b71bb20d1e.exe
Verdict:
Malicious activity
Analysis date:
2023-01-10 19:10:41 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Running batch commands
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 781799 Sample: ZnZZe0399G.exe Startdate: 10/01/2023 Architecture: WINDOWS Score: 100 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus detection for dropped file 2->62 64 Multi AV Scanner detection for submitted file 2->64 66 7 other signatures 2->66 10 ZnZZe0399G.exe 3 2->10         started        13 los.exe 2 2->13         started        15 los.exe 2 2->15         started        17 los.exe 2->17         started        process3 file4 52 C:\Users\user\AppData\...\ZnZZe0399G.exe.log, ASCII 10->52 dropped 19 ZnZZe0399G.exe 5 4 10->19         started        22 ZnZZe0399G.exe 10->22         started        24 backgroundTaskHost.exe 10->24         started        26 los.exe 13->26         started        28 los.exe 15->28         started        30 los.exe 17->30         started        process5 file6 46 C:\Users\user\AppData\Roaming\los.exe, PE32 19->46 dropped 48 C:\Users\user\...\los.exe:Zone.Identifier, ASCII 19->48 dropped 50 C:\Users\user\AppData\...\plyjglruzzqep.vbs, data 19->50 dropped 32 wscript.exe 1 19->32         started        process7 dnsIp8 54 192.168.2.1 unknown unknown 32->54 35 cmd.exe 1 32->35         started        process9 process10 37 los.exe 3 35->37         started        40 conhost.exe 35->40         started        signatures11 68 Multi AV Scanner detection for dropped file 37->68 70 Machine Learning detection for dropped file 37->70 42 los.exe 2 15 37->42         started        process12 dnsIp13 56 nadiac7806.hopto.org 45.81.39.10, 2397, 49685 LVLT-10753US United States 42->56 58 geoplugin.net 178.237.33.50, 49686, 80 ATOM86-ASATOM86NL Netherlands 42->58 72 Installs a global keyboard hook 42->72 signatures14
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2023-01-10 07:49:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:mekino-remotehost persistence rat
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
nadiac7806.hopto.org:2397
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d9fd6d68bec603b5613b5c8e873a3385b93f8a33d781b275762e76bacfb00ce8
MD5 hash:
058473fee52d7adcfb8bbfc97f41286f
SHA1 hash:
7fedec96b57b634a2a026669e8c01485d1e43ae9
SH256 hash:
ca6559a1b23571fed6825eee183f017d047905e1afe44015f9c9c9b08a752874
MD5 hash:
f8c488a0f89eb2a24163a08eb0619c2f
SHA1 hash:
7e077f94c33140f41ba3ffdd01013f4311f10278
SH256 hash:
c47e2d12442ecc8e285ac50096896d2f5c5e7eb0d6be54c211011e8c440e2c83
MD5 hash:
134c8597c51c3ceb44400bc003c60fa2
SHA1 hash:
7ca835dd55c7a84175c03c86d2892719e3d05092
SH256 hash:
ff1b42ea7d56a37eae801adbddb7116f52a4664c0b41302736f522852edc2747
MD5 hash:
89ac57478044c57c7195943116a521e0
SHA1 hash:
1ff2bafeed795423e3538d810bda8e1e3fcdcfa5
SH256 hash:
778ad2e8d477b0fc3ba8cbb0e3de025a6f101257c67efeb60f2bc5627996e028
MD5 hash:
2d9b808a09cc50bf8cf027b71bb20d1e
SHA1 hash:
9a167bfba1a74041f7dd0728b32205a4552e1b5c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 778ad2e8d477b0fc3ba8cbb0e3de025a6f101257c67efeb60f2bc5627996e028

(this sample)

  
Delivery method
Distributed via web download

Comments