MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7a850d5dfddcf237f182d3ffeaf90adb91274f476ca9c4c0306fcd8a6d230b5d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 5
| SHA256 hash: | 7a850d5dfddcf237f182d3ffeaf90adb91274f476ca9c4c0306fcd8a6d230b5d |
|---|---|
| SHA3-384 hash: | 3398bc2e47de4b7d2f30f620592892ea5ce25803dd377c506ecf798c0ad0c9a69dbc77787cebbf7ad8e1ab88f0abfb24 |
| SHA1 hash: | de7c2f63ad7f3e1c092f44541a65daa5ef495d30 |
| MD5 hash: | e33cb2ad4b8e60e13287b488d8d2514b |
| humanhash: | football-nitrogen-magazine-ack |
| File name: | Swift copy_BILLING INVOICE.uue |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 424'440 bytes |
| First seen: | 2021-02-19 08:53:39 UTC |
| Last seen: | Never |
| File type: | uue |
| MIME type: | application/x-rar |
| ssdeep | 12288:jdZwp0R+d0LCp6spzzXWqs87XCk7YmFvXEjyQ:LIghnsZKkf7F90 |
| TLSH | 989423643A9C65889247885A0442B16A726FFFEC4F4D44BEBC03801BA17EDFAB9D0352 |
| Reporter | |
| Tags: | RAT RemcosRAT uue |
abuse_ch
Malspam distributing RemcosRAT:HELO: sd.latticesystems.com
Sending IP: 204.152.206.90
From: Accgt2 <mhdd_phoenix@yahoo.com>
Subject: Fw: BILLING INVOICE
Attachment: Swift copy_BILLING INVOICE.uue (contains "Swift copy_BILLING INVOICE.pdf.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Detplock
Status:
Malicious
First seen:
2021-02-19 08:54:08 UTC
AV detection:
13 of 47 (27.66%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.