MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ae17db9aa6d38297397c2f165275107674c25bcf88dc90720ba87d37cb000c3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments 1

SHA256 hash: 7ae17db9aa6d38297397c2f165275107674c25bcf88dc90720ba87d37cb000c3
SHA3-384 hash: c06fa54966173518749479421f6133c7234733dbae0761c5d7114096af0ff8c6d6ec82d92b5bb0d8597ed9dbbd8955a7
SHA1 hash: 4aa6843b34ecc3d25c641435c76c52e4bbd66f04
MD5 hash: 5ab0d1bf626ec6aa09802e5c0f4c0324
humanhash: michigan-seventeen-arkansas-september
File name:5ab0d1bf626ec6aa09802e5c0f4c0324
Download: download sample
Signature RemcosRAT
File size:999'424 bytes
First seen:2022-05-20 13:29:16 UTC
Last seen:2022-05-20 14:47:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:ZdmD6lwyswG1GRIGHVj3lPwEsp14FrswgT6qo0pPMm:ZdmD637G1sIGHVj1PwEsp6rsP9o0pPM
Threatray 1'484 similar samples on MalwareBazaar
TLSH T1AA25121837D48B22D47D4BB5A03294901B7ABD1AB893F72FBED475C918B37A04152BB3
TrID 54.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
23.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
7.8% (.EXE) Win64 Executable (generic) (10523/12/4)
4.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.3% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon ecccd4dcd4e4d4d4 (1 x RemcosRAT)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
278
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
5ab0d1bf626ec6aa09802e5c0f4c0324
Verdict:
Malicious activity
Analysis date:
2022-05-20 13:29:58 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed update.exe wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 631131 Sample: JRCWCfahHi Startdate: 20/05/2022 Architecture: WINDOWS Score: 100 44 Malicious sample detected (through community Yara rule) 2->44 46 Multi AV Scanner detection for dropped file 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 8 other signatures 2->50 7 JRCWCfahHi.exe 7 2->7         started        process3 file4 30 C:\Users\user\AppData\...\cEaafOxbKtOB.exe, PE32 7->30 dropped 32 C:\Users\...\cEaafOxbKtOB.exe:Zone.Identifier, ASCII 7->32 dropped 34 C:\Users\user\AppData\Local\...\tmp2141.tmp, XML 7->34 dropped 36 C:\Users\user\AppData\...\JRCWCfahHi.exe.log, ASCII 7->36 dropped 56 Uses schtasks.exe or at.exe to add and modify task schedules 7->56 58 Adds a directory exclusion to Windows Defender 7->58 60 Injects a PE file into a foreign processes 7->60 11 JRCWCfahHi.exe 2 15 7->11         started        15 powershell.exe 25 7->15         started        17 schtasks.exe 1 7->17         started        signatures5 process6 dnsIp7 38 salesumishcn.ddns.net 31.42.186.188, 49764, 49770, 49771 YURTEH-ASUA Ukraine 11->38 40 geoplugin.net 178.237.33.50, 49769, 80 ATOM86-ASATOM86NL Netherlands 11->40 42 192.168.2.1 unknown unknown 11->42 62 Installs a global keyboard hook 11->62 64 Injects a PE file into a foreign processes 11->64 19 JRCWCfahHi.exe 2 11->19         started        22 JRCWCfahHi.exe 1 11->22         started        24 JRCWCfahHi.exe 11->24         started        26 conhost.exe 15->26         started        28 conhost.exe 17->28         started        signatures8 process9 signatures10 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Tries to steal Instant Messenger accounts or passwords 22->54
Threat name:
ByteCode-MSIL.Trojan.RealProtectPENG
Status:
Malicious
First seen:
2022-05-20 10:15:32 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
18 of 40 (45.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:new dayys collection rat spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Checks computer location settings
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
salesumishcn.ddns.net:9764
Unpacked files
SH256 hash:
2e0746e9106600d278afaf031f522fa0b0db7046d575936e31fddcfa4c163918
MD5 hash:
4eadf8bd0649af71447c50623a7f8b54
SHA1 hash:
75d0f916b87f441208376968cc6abf02de3320bb
SH256 hash:
9fb2e62b058447be9f04efff777038958cd3d4e3cae9e5f27fb6a2772c33f1f6
MD5 hash:
c9c1a8db7394fcaac909decd42e02955
SHA1 hash:
8083660396f55cb36b1b81a18295fb117c0e04a9
SH256 hash:
4228fb9b4af549d4216c7ba8a4acb847925e12a063fe88a08a4fdd129d90a9af
MD5 hash:
6f9690a8c95a44733397ab3c14319a0c
SHA1 hash:
e240c56d02a97a07bbb238a2b5833c70d5ee7e32
Detections:
win_remcos_auto
SH256 hash:
187700e1704dbfc438d8e0e47ed6d15b4d4e0bffa638216eddfcc51ec0a2d617
MD5 hash:
3a0fe46229da323fff01b7e23b6c484b
SHA1 hash:
f795f8ad1a08e3ab98bc3db2b51683fdfba99f66
SH256 hash:
7ae17db9aa6d38297397c2f165275107674c25bcf88dc90720ba87d37cb000c3
MD5 hash:
5ab0d1bf626ec6aa09802e5c0f4c0324
SHA1 hash:
4aa6843b34ecc3d25c641435c76c52e4bbd66f04
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 7ae17db9aa6d38297397c2f165275107674c25bcf88dc90720ba87d37cb000c3

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-05-20 13:29:29 UTC

url : hxxp://172.245.120.39/400/vbc.exe