MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 786dd4d9050a7a8d83b60280da6360b73ebf5680da7c9e5d8f6762f425ba099e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 10 File information Comments

SHA256 hash: 786dd4d9050a7a8d83b60280da6360b73ebf5680da7c9e5d8f6762f425ba099e
SHA3-384 hash: 9ddbebafe1922b4b0002f2904e4ef2b2544fdca4427c553d33994ff35d536c808a8d51b11df9f7d4a05f4d5305567545
SHA1 hash: 70b58cdd4b6625e6744bf5f2d61aacd41ed039cf
MD5 hash: 5608705449f9024fd604e2aa95ddf473
humanhash: timing-tango-delta-lamp
File name:DHL_119040 documento de recibo,pdf.exe
Download: download sample
Signature RemcosRAT
File size:690'864 bytes
First seen:2020-10-25 17:15:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'648 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 12288:n5GNYe6NHnnGv7lgXPB0TyvqKd4ZpIUMpYjOKS8D:E
Threatray 953 similar samples on MalwareBazaar
TLSH F7E4ED3C6E8425A35173E276A4F90587FEE8698673785D4B02C37B482D6AF023D9734E
Reporter abuse_ch
Tags:DHL exe MailChannels RemcosRAT


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: insect.birch.relay.mailchannels.net
Sending IP: 23.83.209.93
From: DHL Express Cargo <delivery@dhl.com>
Subject: RV: ENTREGA DE CARGA DHL
Attachment: DHL_119040 documento de recibo,pdf.iso (contains "DHL_119040 documento de recibo,pdf.exe")

RemcosRAT C2:
insidelife1.ddns.net:8811

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Creating a file
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 303926 Sample: DHL_119040 documento de rec... Startdate: 25/10/2020 Architecture: WINDOWS Score: 100 26 insidelife1.ddns.net 2->26 30 Multi AV Scanner detection for domain / URL 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus detection for dropped file 2->34 36 14 other signatures 2->36 7 DHL_119040 documento de recibo,pdf.exe 1 4 2->7         started        11 vlc.exe 1 2->11         started        13 vlc.exe 2->13         started        signatures3 process4 file5 24 C:\Users\user\AppData\Roaming\...\vlc.exe, PE32 7->24 dropped 38 Injects a PE file into a foreign processes 7->38 15 DHL_119040 documento de recibo,pdf.exe 2 7->15         started        18 DHL_119040 documento de recibo,pdf.exe 7->18         started        20 vlc.exe 11->20         started        22 vlc.exe 13->22         started        signatures6 process7 dnsIp8 28 insidelife1.ddns.net 216.38.7.231, 49739, 49740, 49741 ASN-GIGENETUS United States 15->28
Threat name:
ByteCode-MSIL.Trojan.Variadic
Status:
Malicious
First seen:
2020-10-25 16:02:50 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence rat family:remcos
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
insidelife1.ddns.net:8811
Unpacked files
SH256 hash:
786dd4d9050a7a8d83b60280da6360b73ebf5680da7c9e5d8f6762f425ba099e
MD5 hash:
5608705449f9024fd604e2aa95ddf473
SHA1 hash:
70b58cdd4b6625e6744bf5f2d61aacd41ed039cf
SH256 hash:
acb8d6bb65401a1524124453a0a5655e538b76189eb88386a9a14e6b4f85b9f2
MD5 hash:
237d98e9aed59c2c10ccc7b2417df272
SHA1 hash:
0b322ed364408fb5afb93951517595a847e99173
SH256 hash:
267d879ab7f74d4c76c08d404ae6ba126d67a637ab333d8fb7c2c0c341af4be1
MD5 hash:
700662352ac529b35af691508535ea5d
SHA1 hash:
3594aa46fe2cb03bbc720b4d9608255f6b942195
SH256 hash:
ef8e084c9c5c4853fecdf640f26e0e4f214a6031451524281d4bb7708f926a1c
MD5 hash:
76dbb0c79b0926f697c642f376ce2ac9
SHA1 hash:
ad043a1c9ed2d710f9c89da1f5f4df96c52813db
Detections:
win_remcos_g0 win_remcos_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:unixredflags
Author:Tim Brown @timb_machine
Description:Hunts for red flags
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 786dd4d9050a7a8d83b60280da6360b73ebf5680da7c9e5d8f6762f425ba099e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments