MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89ba05dd82c47779436799efad2651f54e2823b0606a46e984ee7b17881c97c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemoteManipulator


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 22 File information Comments

SHA256 hash: 89ba05dd82c47779436799efad2651f54e2823b0606a46e984ee7b17881c97c5
SHA3-384 hash: 9d8c090dfcf4412e144e1711923923e4a732b23160f2a27d11917d18b6cd24ff810788c9936b06793ae2787c8591bb44
SHA1 hash: b26c53c4082a001a8cce1d7e1f0b7d9266f0e79a
MD5 hash: 3b792b5759ac51415be1c8405d772ca9
humanhash: oklahoma-louisiana-friend-saturn
File name:3b792b5759ac51415be1c8405d772ca9.exe
Download: download sample
Signature RemoteManipulator
File size:10'951'629 bytes
First seen:2025-02-01 23:55:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cfda23baf1e2e983ddfeca47a5c755a (33 x RedLineStealer, 6 x Dridex, 5 x NetSupport)
ssdeep 196608:AaEXZUCVKZhHIHVJhnpT+IHKPmUU2R79xLkUav4utUcVvD4JTOBopmf5t:QZUCVh1Jhpq6cmUU2NnYpv9UcVvD4sog
Threatray 2 similar samples on MalwareBazaar
TLSH T18DB63352B646C172CB434970CA6DE5F6E5323C91E36594A7BB843E8432FABF206135E3
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 7179ec3d99dce971 (1 x RemoteManipulator)
Reporter abuse_ch
Tags:exe RemoteManipulator


Avatar
abuse_ch
RemoteManipulator C2:
77.223.119.187:5655

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
77.223.119.187:5655 https://threatfox.abuse.ch/ioc/1402213/

Intelligence


File Origin
# of uploads :
1
# of downloads :
613
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
3b792b5759ac51415be1c8405d772ca9.exe
Verdict:
Malicious activity
Analysis date:
2025-02-01 23:55:48 UTC
Tags:
rat rms sfx dropper aspack delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect phishing
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer microsoft_visual_cc packed packer_detected sfx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RMSRemoteAdmin
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses regedit.exe to modify the Windows registry
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1604818 Sample: aIvXBDK58b.exe Startdate: 02/02/2025 Architecture: WINDOWS Score: 100 62 rmansys.ru 2->62 64 rms-server.tektonit.ru 2->64 66 main.internetid.ru 2->66 78 Suricata IDS alerts for network traffic 2->78 80 Antivirus detection for dropped file 2->80 82 Multi AV Scanner detection for dropped file 2->82 84 5 other signatures 2->84 12 aIvXBDK58b.exe 1 8 2->12         started        15 rutserv.exe 2->15         started        signatures3 process4 dnsIp5 60 C:\Users\user\Desktop\over1.sfx.exe, PE32 12->60 dropped 18 cmd.exe 1 12->18         started        68 rmansys.ru 31.31.198.18, 49710, 49723, 80 AS-REGRU Russian Federation 15->68 70 main.internetid.ru 77.223.119.187, 49725, 49979, 49980 EKAT-ASRU Russian Federation 15->70 21 rfusclient.exe 15->21         started        23 rfusclient.exe 15->23         started        file6 process7 signatures8 76 Uses regedit.exe to modify the Windows registry 18->76 25 over1.sfx.exe 8 18->25         started        28 conhost.exe 18->28         started        30 rfusclient.exe 21->30         started        process9 file10 58 C:\Users\user\AppData\Local\Temp\over1.exe, PE32 25->58 dropped 32 over1.exe 3 12 25->32         started        process11 file12 50 C:\Program Files\java\vp8encoder.dll, PE32 32->50 dropped 52 C:\Program Files\java\vp8decoder.dll, PE32 32->52 dropped 54 C:\Program Files\java\rutserv.exe, PE32 32->54 dropped 56 C:\Program Files\java\rfusclient.exe, PE32 32->56 dropped 72 Multi AV Scanner detection for dropped file 32->72 74 Machine Learning detection for dropped file 32->74 36 wscript.exe 1 32->36         started        signatures13 process14 signatures15 86 Windows Scripting host queries suspicious COM object (likely to drop second stage) 36->86 39 cmd.exe 1 36->39         started        process16 process17 41 rutserv.exe 39->41         started        44 rutserv.exe 39->44         started        46 taskkill.exe 1 39->46         started        48 6 other processes 39->48 signatures18 88 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 41->88
Threat name:
Win32.Trojan.Starter
Status:
Malicious
First seen:
2016-12-13 05:35:00 UTC
File Type:
PE (Exe)
Extracted files:
95
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:rms aspackv2 discovery rat trojan upx
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Runs .reg file with regedit
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in System32 directory
UPX packed file
ACProtect 1.3x - 1.4x DLL software
ASPack v2.12-2.42
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
RMS
Rms family
Verdict:
Malicious
Tags:
Win.Trojan.Rasftuby-9830266-0
YARA:
n/a
Unpacked files
SH256 hash:
3ef8f2f613af681aa4760512b60376d51c515ab347e01e0ccdc1fefdea324d46
MD5 hash:
4ffbfb6e061045f8503f533a8dc470f0
SHA1 hash:
5c82824cddbaa121a1493b0bade0d245ba2a1dfc
Detections:
INDICATOR_EXE_Packed_ASPack INDICATOR_SUSPICIOUS_EXE_PE_ResourceTuner MALWARE_Win_RemoteUtilitiesRAT
SH256 hash:
28a778de52c1813dd71552dfdecad90baa10e235fbc8fdf2535e99e933d0fdab
MD5 hash:
8f61e16f276571a596badf7fc51b346b
SHA1 hash:
348877053a9fea97026f36102df085e468f6fb7c
SH256 hash:
cbd25b1829dcb7d63d25dce5be579a983d92176cb89d358b0286ccb2d9056995
MD5 hash:
eaf73a847ed7b845b6361ebd31db9382
SHA1 hash:
412c5008ff1911cd61d0b590eeb750eb68786496
SH256 hash:
89ba05dd82c47779436799efad2651f54e2823b0606a46e984ee7b17881c97c5
MD5 hash:
3b792b5759ac51415be1c8405d772ca9
SHA1 hash:
b26c53c4082a001a8cce1d7e1f0b7d9266f0e79a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_DustSquad_PE_Nov19_1
Author:Arkbird_SOLG
Description:Detection Rule for APT DustSquad campaign Nov19
Reference:https://twitter.com/Rmy_Reserve/status/1197448735422238721
Rule name:APT_DustSquad_PE_Nov19_2
Author:Arkbird_SOLG
Description:Detection Rule for APT DustSquad campaign Nov19
Reference:https://twitter.com/Rmy_Reserve/status/1197448735422238721
Rule name:ASPackv212AlexeySolodovnikov
Author:malware-lu
Rule name:ASProtectV2XDLLAlexeySolodovnikov
Author:malware-lu
Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_PE_ResourceTuner
Author:ditekSHen
Description:Detects executables with modified PE resources using the unpaid version of Resource Tuner
Rule name:MALWARE_Win_RemoteUtilitiesRAT
Author:ditekSHen
Description:RemoteUtilitiesRAT RAT payload
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:possible_trojan_banker
Author:@johnk3r
Description:Detects common strings, DLL and API in Banker_BR
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SR_APT_DustSquad_PE_Nov19
Author:Arkbird_SOLG
Description:Super Rule for APT DustSquad campaign Nov19
Reference:https://twitter.com/Rmy_Reserve/status/1197448735422238721
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:win_rms_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::SetFileSecurityW
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::FindWindowExW
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments