MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8bf8b980381fd607ec9065bfbcd572973770ee77c815354a35455c10651516d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 24 File information Comments

SHA256 hash: 8bf8b980381fd607ec9065bfbcd572973770ee77c815354a35455c10651516d5
SHA3-384 hash: b48a890c3807851bf06a817bf45479ec229d9b9e04e4a92775b65b871c8d1a0b1985242f69a0c1b34acec6fedcdaf165
SHA1 hash: 0561fc6471cb5e2f0aa9e6b3e3fdfa9fd2586dbc
MD5 hash: 533b3df0e597c50e1129ec807fd6bbcf
humanhash: romeo-colorado-london-mobile
File name:8bf8b980381fd607ec9065bfbcd572973770ee77c815354a35455c10651516d5
Download: download sample
Signature RemcosRAT
File size:1'131'463 bytes
First seen:2023-08-23 17:28:05 UTC
Last seen:2023-08-28 13:47:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash eeb6f210c31e51d5b63be371278c03a3 (3 x RemcosRAT)
ssdeep 24576:+9PSlSUTC5lG8L14BQG/AWgbPmEqE5pLixE7pnrEH7T:+9PUZT2d14aGoTlnp52
Threatray 2'481 similar samples on MalwareBazaar
TLSH T1F935D016A17885BBD1E30E34F84E6394951B7E391F38384365D2BD8DBA3E681B52C783
TrID 84.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.2% (.SCR) Windows screen saver (13097/50/3)
2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 74f0d4d6c4c4d0c4 (4 x RemcosRAT, 1 x DBatLoader)
Reporter Anonymous
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
302
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
8bf8b980381fd607ec9065bfbcd572973770ee77c815354a35455c10651516d5
Verdict:
Malicious activity
Analysis date:
2023-08-23 17:31:01 UTC
Tags:
floxif trojan dbatloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for the window
Creating a file
Enabling the libraries to load when starting the app (AppInit_DLLs)
Сreating synchronization primitives
Creating a window
Creating a file in the Program Files subdirectories
Replacing executable files
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Creating a file in the mass storage device
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun
Infecting executable files
Unauthorized injection to a system process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader, FloodFix
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found malware configuration
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Remcos
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected DBatLoader
Yara detected FloodFix
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1296068 Sample: 0vJrK0NCd1.exe Startdate: 23/08/2023 Architecture: WINDOWS Score: 100 76 Multi AV Scanner detection for domain / URL 2->76 78 Found malware configuration 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 12 other signatures 2->82 11 0vJrK0NCd1.exe 2 9 2->11         started        16 Elpuxpki.PIF 2->16         started        18 Elpuxpki.PIF 2->18         started        process3 dnsIp4 72 balkancelikdovme.com 185.181.116.217, 443, 49727, 49736 GYRONGB United Kingdom 11->72 60 C:\Users\Public\Libraries\netutils.dll, PE32+ 11->60 dropped 62 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 11->62 dropped 64 C:\Users\Public\Librarieslpuxpki.PIF, PE32 11->64 dropped 66 3 other malicious files 11->66 dropped 96 Early bird code injection technique detected 11->96 98 Drops PE files with a suspicious file extension 11->98 100 Allocates memory in foreign processes 11->100 102 Queues an APC in another process (thread injection) 11->102 20 cmd.exe 1 11->20         started        23 colorcpl.exe 3 3 11->23         started        104 Antivirus detection for dropped file 16->104 106 Multi AV Scanner detection for dropped file 16->106 108 Machine Learning detection for dropped file 16->108 27 SndVol.exe 16->27         started        29 colorcpl.exe 18->29         started        file5 signatures6 process7 dnsIp8 84 Uses ping.exe to sleep 20->84 86 Drops executables to the windows directory (C:\Windows) and starts them 20->86 88 Uses ping.exe to check the status of other devices and networks 20->88 31 easinvoker.exe 20->31         started        33 PING.EXE 1 20->33         started        36 xcopy.exe 2 20->36         started        39 8 other processes 20->39 70 greatzillart.ydns.eu 185.216.71.113, 1984, 49729, 49746 CLOUDCOMPUTINGDE Germany 23->70 58 C:\ProgramData\remcos\logs.dat, data 23->58 dropped 90 Installs a global keyboard hook 23->90 file9 signatures10 process11 dnsIp12 41 cmd.exe 1 31->41         started        68 127.0.0.1 unknown unknown 33->68 54 C:\Windows \System32\easinvoker.exe, PE32+ 36->54 dropped 56 C:\Windows \System32\netutils.dll, PE32+ 39->56 dropped file13 process14 signatures15 92 Adds a directory exclusion to Windows Defender 41->92 44 cmd.exe 1 41->44         started        47 conhost.exe 41->47         started        process16 signatures17 94 Adds a directory exclusion to Windows Defender 44->94 49 powershell.exe 23 44->49         started        process18 signatures19 74 DLL side loading technique detected 49->74 52 conhost.exe 49->52         started        process20
Threat name:
Win32.Virus.Floxif
Status:
Malicious
First seen:
2023-08-22 13:49:22 UTC
File Type:
PE (Exe)
Extracted files:
76
AV detection:
36 of 37 (97.30%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:greatzillart persistence rat trojan upx
Behaviour
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Adds Run key to start application
Enumerates connected drives
ACProtect 1.3x - 1.4x DLL software
Executes dropped EXE
Loads dropped DLL
UPX packed file
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
greatzillart.ydns.eu:1984
Unpacked files
SH256 hash:
8bf8b980381fd607ec9065bfbcd572973770ee77c815354a35455c10651516d5
MD5 hash:
533b3df0e597c50e1129ec807fd6bbcf
SHA1 hash:
0561fc6471cb5e2f0aa9e6b3e3fdfa9fd2586dbc
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_FloodFix
Author:ditekSHen
Description:Detects FloodFix
Rule name:MAL_Floxif_Generic
Author:Florian Roth (Nextron Systems)
Description:Detects Floxif Malware
Reference:Internal Research
Rule name:MAL_Floxif_Generic_RID2DCE
Author:Florian Roth
Description:Detects Floxif Malware
Reference:Internal Research
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:SUSP_Microsoft_Copyright_String_Anomaly_2
Author:Florian Roth (Nextron Systems)
Description:Detects Floxif Malware
Reference:Internal Research
Rule name:SUSP_Microsoft_Copyright_String_Anomaly_2_RID3720
Author:Florian Roth
Description:Detects Floxif Malware
Reference:Internal Research
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_floxif_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.floxif.
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 8bf8b980381fd607ec9065bfbcd572973770ee77c815354a35455c10651516d5

(this sample)

Comments