MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7daf8284efc4642021a973c3e92971eeb15633b26f738406647f1d3b2992b3af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: 7daf8284efc4642021a973c3e92971eeb15633b26f738406647f1d3b2992b3af
SHA3-384 hash: 8c0d4f63de3985e710fc6261def0dd90e4d6dc227cfaab6778c8e7ba72973d189e7b224616edfa328284a57335186f2a
SHA1 hash: d95e90a7877430ee0cf0b56fbf7c2dc9dfd1578c
MD5 hash: 063c8e16d051271ed9363f537679ee9a
humanhash: robin-island-wisconsin-nevada
File name:7daf8284efc4642021a973c3e92971eeb15633b26f738406647f1d3b2992b3af
Download: download sample
Signature RemcosRAT
File size:1'136'752 bytes
First seen:2021-09-09 11:57:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT)
ssdeep 24576:h/CNBKOsWsN6640tJn5mTBQGktmHa2nMviVD5ucpzdw0:yKOaBfIBQG6Ya2nwifucxd3
Threatray 2'029 similar samples on MalwareBazaar
TLSH T10B35AD0273E1D032FFABA2739B2AE641567878254573852F13982DBDBD702B2563D723
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter JAMESWT_WT
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7daf8284efc4642021a973c3e92971eeb15633b26f738406647f1d3b2992b3af
Verdict:
Malicious activity
Analysis date:
2021-09-09 11:57:51 UTC
Tags:
trojan rat remcos loader keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Running batch commands
Creating a file in the %AppData% directory
Launching a process
Sending a UDP request
Unauthorized injection to a recently created process
DNS request
Connection attempt
Sending an HTTP GET request
Connection attempt to an infection source
Sending a custom TCP request
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Setting a global event handler for the keyboard
Query of malicious DNS domain
Enabling autorun by creating a file
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
AutoIt script contains suspicious strings
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates HTML files with .exe extension (expired dropper behavior)
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Certutil Command
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 480553 Sample: nO86vRtjAk Startdate: 09/09/2021 Architecture: WINDOWS Score: 100 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Antivirus / Scanner detection for submitted sample 2->55 57 7 other signatures 2->57 7 Winrar.exe.bat 1 2->7         started        11 nO86vRtjAk.exe 4 2->11         started        13 OpenWith.exe 17 6 2->13         started        process3 file4 39 C:\Users\user\AppData\Local\...\startup.bat, DOS 7->39 dropped 59 Antivirus detection for dropped file 7->59 61 Binary is likely a compiled AutoIt script file 7->61 63 Contains functionality to steal Chrome passwords or cookies 7->63 65 Injects a PE file into a foreign processes 7->65 15 cmd.exe 2 7->15         started        17 Winrar.exe.bat 7->17         started        19 Winrar.exe.bat 7->19         started        26 7 other processes 7->26 41 C:\Users\user\AppData\...\Winrar.exe.bat, PE32 11->41 dropped 67 Contains functionality to capture and log keystrokes 11->67 69 Contains functionality to inject code into remote processes 11->69 71 Contains functionality to steal Firefox passwords or cookies 11->71 21 cmd.exe 2 11->21         started        23 nO86vRtjAk.exe 2 3 11->23         started        signatures5 process6 dnsIp7 28 certutil.exe 15 15->28         started        33 conhost.exe 15->33         started        35 certutil.exe 15 21->35         started        37 conhost.exe 21->37         started        45 www.rmagent.biz 35.205.61.67, 7181 GOOGLEUS United States 23->45 process8 dnsIp9 43 C:\Users\user\AppData\...\yourfile.exe, HTML 28->43 dropped 47 al-sharqgroup.com 185.61.154.7, 443, 49768, 49769 NAMECHEAP-NETUS United Kingdom 35->47 49 192.168.2.1 unknown unknown 35->49 73 System process connects to network (likely due to code injection or exploit) 35->73 75 Creates HTML files with .exe extension (expired dropper behavior) 35->75 file10 signatures11
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2021-09-05 02:17:44 UTC
File Type:
PE (Exe)
Extracted files:
33
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remote%host rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Drops startup file
Remcos
Malware Config
C2 Extraction:
www.rmagent.biz:7181
Unpacked files
SH256 hash:
e5d56a9880242b2d754c16974f3f35a91b98de9fbaf718360ca64099e13a38bf
MD5 hash:
836f20f29fe33a7f80578d36dd3429c6
SHA1 hash:
edbea84969b18b9e241a3bc7fe4b61dd302f58a9
Detections:
win_remcos_g0 win_remcos_auto
Parent samples :
8183b2d8394a4301c88f8c0ca1addb9aa56093b15ebf76404f9aa1d00524a187
1c76ef4a3f765ace9e4518de52631bac09f50ad67f5927ae7303482658c4f675
113354cddc407ca32cd4cff44470262b75d945ce0030e42f0c7d9fd8b59b10e9
e9830ef956d6736a6553db30a9b62f758657b24458e2061bc967864ab4a729f9
0e6603f6a701732a9f0757396c2e3e7de424975a38aad0b6ef96bf576d5a5f8f
999757965ae0d2f93b8f612ca2977877cd4c29aaf331e7deaaa74fc65118d34a
bf05b86e2e3913b902481201edc5caf2a622307e67238a1c933d558bca530dea
be9c3eff775320ab2cbb1007bdd6f3e707cece9070443e26b527d36b62b988f3
51611ffb39a6a802631cc9dd10b9e1c268750d153649ff9ce5561f5380c1bc11
e9cb44295ac4cf6361c9a07c2a6ea7f2abd2f0dea50907e087a5d08709309f12
07f97cee8c415530d661bd2b00290c71ff8e9b04fcf1296d7e34faa353d931fa
9f3ecca1d154768af43a2965fe3aa44e75fd4660318baab1ca8c37b2e7dda286
0f3cbb7289d093b487ae9ae23025d9564548f91f43f053019fbeaba69a0c0bd0
9bd23254e649727b156e24d67d9664551ad38d8c96aee85a31a879c5d7c8c7e3
a8db94ef91bbad62ed224fdec6619578bc922126d7437ee473cb7590673804be
8010180b13a4edd3e82645d5c9241cc1e18bce38812ecd9f4025ac91bdedc3bd
8b51f929a5f1cc176a861bf6c8e501685c1e81e6b52ed0118190462090f3c179
23095e8502e45036d73174aed89a50dd392643f54caf8bc3b2e5401b03157868
e694ad9d77c0dc4e6db351e6bf61295ab3f89dda61411cc61d505fc16efe9954
2cdec60870b9b4e97578cf23657793ac65dade4d013ecaf5ed521a506cc60809
47fe917a6cb89e8e36bf2d99a18dd2621c62e1bfd3981b4ea98decbfe8559085
c146398438a2212a2ceac1d4835541d8fe3420d47e3b777ed450103da5366e56
8186ef5e4f05de2df48edee969714440e218b67b354a5a20f65fb18a111cc5bf
b3f5b8a028e3f6f81c98a7ef5f987c75df866875f5f76f8e771aff395a6597d2
ace69c6d2c56b550430d58ff08f39b93e543df4ae75802bcf07974d86fda3bb0
7daf8284efc4642021a973c3e92971eeb15633b26f738406647f1d3b2992b3af
8e4000c97e394c875e794b3617b82cc8141eeedf729eff543e6c5cadab6f8812
3cdea283c5c6c18dce8e6b7a619a91769b9e5d5f5d7411f7c655d56ba28ecbf4
3ee1461c2e2753d4872f4a12af33d4b927920e9a3f2e38bcbfe40756b1cfe7e8
SH256 hash:
7daf8284efc4642021a973c3e92971eeb15633b26f738406647f1d3b2992b3af
MD5 hash:
063c8e16d051271ed9363f537679ee9a
SHA1 hash:
d95e90a7877430ee0cf0b56fbf7c2dc9dfd1578c
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments