MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a850d5dfddcf237f182d3ffeaf90adb91274f476ca9c4c0306fcd8a6d230b5d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 7a850d5dfddcf237f182d3ffeaf90adb91274f476ca9c4c0306fcd8a6d230b5d
SHA3-384 hash: 3398bc2e47de4b7d2f30f620592892ea5ce25803dd377c506ecf798c0ad0c9a69dbc77787cebbf7ad8e1ab88f0abfb24
SHA1 hash: de7c2f63ad7f3e1c092f44541a65daa5ef495d30
MD5 hash: e33cb2ad4b8e60e13287b488d8d2514b
humanhash: football-nitrogen-magazine-ack
File name:Swift copy_BILLING INVOICE.uue
Download: download sample
Signature RemcosRAT
File size:424'440 bytes
First seen:2021-02-19 08:53:39 UTC
Last seen:Never
File type: uue
MIME type:application/x-rar
ssdeep 12288:jdZwp0R+d0LCp6spzzXWqs87XCk7YmFvXEjyQ:LIghnsZKkf7F90
TLSH 989423643A9C65889247885A0442B16A726FFFEC4F4D44BEBC03801BA17EDFAB9D0352
Reporter abuse_ch
Tags:RAT RemcosRAT uue


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: sd.latticesystems.com
Sending IP: 204.152.206.90
From: Accgt2 <mhdd_phoenix@yahoo.com>
Subject: Fw: BILLING INVOICE
Attachment: Swift copy_BILLING INVOICE.uue (contains "Swift copy_BILLING INVOICE.pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Detplock
Status:
Malicious
First seen:
2021-02-19 08:54:08 UTC
AV detection:
13 of 47 (27.66%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

uue 7a850d5dfddcf237f182d3ffeaf90adb91274f476ca9c4c0306fcd8a6d230b5d

(this sample)

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments