MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 786271b7a04a1a87b72d63969e3bdb017e626d41782884f3cd4d848577032e57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 5
| SHA256 hash: | 786271b7a04a1a87b72d63969e3bdb017e626d41782884f3cd4d848577032e57 |
|---|---|
| SHA3-384 hash: | c6635c7eb0498ad6b82a9fa6e52d32a5433060a857c297192ecaa35a3a91998c2376fc6b590337ce8daeb16e9c33471c |
| SHA1 hash: | fbeb3bc7d9b01d85347f9dd520bddd87cb16c426 |
| MD5 hash: | 9d19fd6b55f9b99646d8ad7d36de5cd5 |
| humanhash: | papa-bacon-blossom-mirror |
| File name: | 0000000000009000...pdf..z |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 132'515 bytes |
| First seen: | 2021-01-12 07:24:55 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 3072:hGBWIyY902kp+D8r17rosUPlm89Q4vooGku6rk927o6T:hSW/Y9JkgU1HUw0Q4vxpuek92hT |
| TLSH | 7FD312D38EA8D9B8C2F6D217242C2BAF53C3B2E154A9B2B75B71C950D5C16C0887336D |
| Reporter | |
| Tags: | RAT RemcosRAT z |
abuse_ch
Malspam distributing RemcosRAT:HELO: hosted-by.rootlayer.net
Sending IP: 185.222.58.152
From: r.abouldahab@emis-int.com
Subject: Re: URGENT REQUIREMENT
Attachment: 0000000000009000...pdf..z (contains "0000000000009000.exe")
RemcosRAT C2:
45.137.22.52:8780
Intelligence
File Origin
# of uploads :
1
# of downloads :
139
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Zmutzy
Status:
Malicious
First seen:
2021-01-12 05:01:13 UTC
AV detection:
11 of 46 (23.91%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.