MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d126dd8b90ef12045e9576a5b28d796c9edbe522789333572210397519ef521. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 8d126dd8b90ef12045e9576a5b28d796c9edbe522789333572210397519ef521
SHA3-384 hash: e7b70d745a9e622bba84586983b026ef5ffe2d4472bc11d35324999df0f87b3ea5f99aea7f82012fc1fdf8b87bb5f357
SHA1 hash: 357fa0071a6d5292737a93ed7ecb2807cfe9ed09
MD5 hash: aaea2c74fc5c631acdb1d3162726fb11
humanhash: four-oklahoma-hydrogen-tennis
File name:8d126dd8b90ef12045e9576a5b28d796c9edbe522789333572210397519ef521
Download: download sample
Signature RemcosRAT
File size:1'603'840 bytes
First seen:2025-10-10 06:29:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0293eec0b5432ad092f24065016203b2 (21 x GuLoader, 9 x RemcosRAT, 6 x Formbook)
ssdeep 49152:uY/YWRlEVb/rhJPSD/TbloVQ0a+cM13Lvue9H9yPyIOy:uY/YWgVb/9zVzaTObvjNSyS
Threatray 1'980 similar samples on MalwareBazaar
TLSH T103752307B220E1A0E6914A701E3EBC1967777F36B94B51872DC4BB2EB3F3053864971A
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter adrian__luca
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
036ba6def972fa19e1f0e8f1b996709e.eml
Verdict:
Malicious activity
Analysis date:
2025-09-14 13:39:32 UTC
Tags:
attachments attc-unc susp-attachments arch-exec rat remcos remote evasion stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
uloader virus nsis blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Delayed reading of the file
Searching for the window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context installer microsoft_visual_cc obfuscated overlay signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-14T08:01:00Z UTC
Last seen:
2025-10-12T01:18:00Z UTC
Hits:
~10000
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2025-09-14 14:01:27 UTC
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery installer
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
8d126dd8b90ef12045e9576a5b28d796c9edbe522789333572210397519ef521
MD5 hash:
aaea2c74fc5c631acdb1d3162726fb11
SHA1 hash:
357fa0071a6d5292737a93ed7ecb2807cfe9ed09
SH256 hash:
db70cfc1016f3ba89bf44b70145d3c27ad673c1dcd318330d5b5d1c375d704cd
MD5 hash:
927f12a8226b1c185bfc8f24cfbbe6c4
SHA1 hash:
0c3adab46ecb8aa7eae8b6376d2c5615556eaa70
SH256 hash:
7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
MD5 hash:
dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1 hash:
c9206ced48d1e5bc648b1d0f54cccc18bf643a14
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments