MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7cfeccb31a610ee9b5e5501c712c380a2098a360eaaad0a15d7d5c23b3cc6830. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 17
| SHA256 hash: | 7cfeccb31a610ee9b5e5501c712c380a2098a360eaaad0a15d7d5c23b3cc6830 |
|---|---|
| SHA3-384 hash: | ca1ee46aab04861fb676e15ea2fa1f12d77e83ad6a2b1e37fde154247ca19b2e943d88764cdb44ca0bbd6a2df8c98d91 |
| SHA1 hash: | 0e39f16f0eb5bf40c00d4db436d1754385a32e00 |
| MD5 hash: | 3f960dea792fe4f00cee113cda4b8320 |
| humanhash: | idaho-kitten-florida-leopard |
| File name: | SecuriteInfo.com.Trojan.Garf.Gen.7.7243.23318 |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 579'386 bytes |
| First seen: | 2022-11-15 03:38:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 29b61e5a552b3a9bc00953de1c93be41 (174 x Formbook, 82 x AgentTesla, 81 x Loki) |
| ssdeep | 12288:WAYjTFFX9mM0e2k0Di5kjYNAEtrIAGiL4PTL+/u99C7:JYjTlmZewiQGCNPTL+/uLe |
| Threatray | 2'206 similar samples on MalwareBazaar |
| TLSH | T1D5C423A448D57863F7A12676DC66E11E82F3A51220E36E4783549E3DBF37AC4E22F017 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | f4f679b179698cd4 (17 x RemcosRAT, 4 x SnakeKeylogger, 2 x NanoCore) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
remcos
ID:
1
File name:
SecuriteInfo.com.Trojan.Garf.Gen.7.7243.23318
Verdict:
Malicious activity
Analysis date:
2022-11-15 03:40:03 UTC
Tags:
rat remcos
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Remcos
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Searching for the window
Сreating synchronization primitives
Setting a keyboard event handler
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
formbook overlay packed remcos shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-11-15 01:53:25 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
21 of 26 (80.77%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 2'196 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos botnet:uc persistence rat
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
ucremcz1.ddns.net:1823
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c2296809155417083c5c50349b1c817a942c72a3411251fbcd6900558be81ed1
MD5 hash:
2dbb39ff68e2110693f6fa79a766c3be
SHA1 hash:
6eccdf701150d004c49aff4070f0f34c16ae1a0b
Detections:
Remcos
win_remcos_auto
Parent samples :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 hash:
d8960e0bb9758a6b65788bd81eb0d66c245b6047532da86263db663d0d357603
MD5 hash:
427285b908f9f961ed8e8411f2faca66
SHA1 hash:
114519edda5b73fd333b34ff455c5f3634a81240
SH256 hash:
7cfeccb31a610ee9b5e5501c712c380a2098a360eaaad0a15d7d5c23b3cc6830
MD5 hash:
3f960dea792fe4f00cee113cda4b8320
SHA1 hash:
0e39f16f0eb5bf40c00d4db436d1754385a32e00
Malware family:
Remcos
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.