MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a5870c5e7f9253deca223afcbf295a99ad0cc014543b26e162e56ad2f22a36e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 7a5870c5e7f9253deca223afcbf295a99ad0cc014543b26e162e56ad2f22a36e
SHA3-384 hash: bd3c52eb74b433a38eb296acff448695872904f08a513c010a94db11244d7e265b7edcaca4be55a37bb05fbab2799a2b
SHA1 hash: 99efd4885f13229423a902b4bdf0ea75c0a6cc51
MD5 hash: 0196e408cf422835b63cecec21d4a817
humanhash: monkey-sink-high-alaska
File name:0196e408cf422835b63cecec21d4a817
Download: download sample
Signature RemcosRAT
File size:1'555'472 bytes
First seen:2022-11-25 09:03:12 UTC
Last seen:2022-11-25 10:30:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 865328ec6e8c931f31b423bc1dffe934 (2 x LgoogLoader, 1 x NetWire, 1 x RemcosRAT)
ssdeep 24576:TGruc42itVa7HKmSUYVqD9DgIxeJk4jyOxQtCRRmj0M5JIRN+wzpFrKZiS:TGry20VtAD9DgIxefKt0R8/5GRN+wzp0
TLSH T1BB759E42748D16BCFAD18D3324FC240AC6E79571EACA02B9174193749A4FCEE7FA25E1
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8000c8cab2cacc10 (1 x RemcosRAT)
Reporter zbetcheckin
Tags:32 exe RemcosRAT signed

Code Signing Certificate

Organisation:*.fishers.net
Issuer:Encryption Everywhere DV TLS CA - G1
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-27T00:00:00Z
Valid to:2023-09-09T23:59:59Z
Serial number: 04ced40beb2c799135712b0c293c2755
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: d8f45bce7bc484c4d43faa41d915db9174133b2feaea4ad4861d519e0626b10d
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
316
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8c6b9b5d-e2fa-4c30-a89b-f34e5d9f0461
Verdict:
Malicious activity
Analysis date:
2022-11-25 06:39:03 UTC
Tags:
opendir trojan exploit cve-2017-11882 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
DNS request
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed redline
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Sigma detected: Remcos
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 753728 Sample: uaUhkQIxPP.exe Startdate: 25/11/2022 Architecture: WINDOWS Score: 100 56 bhxv9bfc.0synvy3xqtr5mhsi9m0tgj9zadcxc8tf 2->56 58 www.sssupersports.com 2->58 78 Malicious sample detected (through community Yara rule) 2->78 80 Multi AV Scanner detection for submitted file 2->80 82 Yara detected Remcos RAT 2->82 84 4 other signatures 2->84 9 uaUhkQIxPP.exe 10 2->9         started        14 Las jep xokav quifoten gosefaci roxara daqueb.exe 2->14         started        signatures3 process4 dnsIp5 66 bhxv9bfc.0synvy3xqtr5mhsi9m0tgj9zadcxc8tf 9->66 48 Las jep xokav quif...i roxara daqueb.exe, PE32 9->48 dropped 50 Las jep xokav quif...exe:Zone.Identifier, ASCII 9->50 dropped 96 Found stalling execution ending in API Sleep call 9->96 98 Self deletion via cmd or bat file 9->98 100 Uses schtasks.exe or at.exe to add and modify task schedules 9->100 16 Las jep xokav quifoten gosefaci roxara daqueb.exe 13 9->16         started        20 cmd.exe 1 9->20         started        22 schtasks.exe 1 9->22         started        68 192.168.2.1 unknown unknown 14->68 file6 signatures7 process8 dnsIp9 52 bhxv9bfc.0synvy3xqtr5mhsi9m0tgj9zadcxc8tf 16->52 54 www.sssupersports.com 172.67.206.152, 443, 49741 CLOUDFLARENETUS United States 16->54 70 Writes to foreign memory regions 16->70 72 Allocates memory in foreign processes 16->72 74 Injects a PE file into a foreign processes 16->74 24 ngentask.exe 2 16 16->24         started        76 Uses ping.exe to check the status of other devices and networks 20->76 29 PING.EXE 1 20->29         started        31 conhost.exe 20->31         started        33 chcp.com 1 20->33         started        35 conhost.exe 22->35         started        signatures10 process11 dnsIp12 60 zoz.mastercoa.co 192.30.89.75, 49742, 49744, 52814 CLOUDSINGULARITYCA Canada 24->60 62 geoplugin.net 178.237.33.50, 49746, 80 ATOM86-ASATOM86NL Netherlands 24->62 46 C:\ProgramData\remcos\logs.dat, data 24->46 dropped 92 Maps a DLL or memory area into another process 24->92 94 Installs a global keyboard hook 24->94 37 ngentask.exe 1 24->37         started        40 ngentask.exe 2 24->40         started        42 ngentask.exe 1 24->42         started        44 2 other processes 24->44 64 127.0.0.1 unknown unknown 29->64 file13 signatures14 process15 signatures16 86 Tries to steal Instant Messenger accounts or passwords 37->86 88 Tries to steal Mail credentials (via file / registry access) 37->88 90 Tries to harvest and steal browser information (history, passwords, etc) 40->90
Threat name:
Win32.Spyware.RedLine
Status:
Suspicious
First seen:
2022-11-24 23:46:03 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
19 of 26 (73.08%)
Threat level:
  2/5
Verdict:
suspicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Deletes itself
Loads dropped DLL
Executes dropped EXE
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
1bbc2d2604969996f13cf24e40caa85f31d536e1633f3e0b32f77d12ce21d41e
MD5 hash:
cede3e9831bb1226bead8528cbcdde60
SHA1 hash:
44c2a75977b4cf02ba3c1d238f6e90959c69ac2b
SH256 hash:
7a5870c5e7f9253deca223afcbf295a99ad0cc014543b26e162e56ad2f22a36e
MD5 hash:
0196e408cf422835b63cecec21d4a817
SHA1 hash:
99efd4885f13229423a902b4bdf0ea75c0a6cc51
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 7a5870c5e7f9253deca223afcbf295a99ad0cc014543b26e162e56ad2f22a36e

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-11-25 09:03:16 UTC

url : hxxp://54.79.28.10/260/vbc.exe