MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d8091a9feae64d126b51f3679a838572ea9578dad2255c329c769922025160b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 8d8091a9feae64d126b51f3679a838572ea9578dad2255c329c769922025160b
SHA3-384 hash: 1b13265261fe00609cdc65c620fde4634e6b901806d713c37e3fa7ed2e1f912df733e77d61a2edf9de06ce9eeddc81fe
SHA1 hash: 385825fa5050290e0e9d5ba0fcd5fe6bfce9e8c8
MD5 hash: 21d9a140fb94572d27eec0e394d9720a
humanhash: spaghetti-alpha-fillet-august
File name:SecuriteInfo.com.W32.AIDetect.malware2.4607.17104
Download: download sample
Signature RemcosRAT
File size:920'576 bytes
First seen:2022-07-21 04:35:20 UTC
Last seen:2022-07-21 13:46:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d516d5168ad28c9c6268d5dbd555a673 (3 x AveMariaRAT, 2 x RemcosRAT, 2 x DBatLoader)
ssdeep 24576:3l5YzsDC+AbbRovDGw3Ny4EYysaxtVSn52pAf2rDNtl2aCHX:3rGJ3bNSn52KN
Threatray 1'209 similar samples on MalwareBazaar
TLSH T165158E26F2A5CC33D062167E4D1A72B59C2E7F113E28F98627E53D486FF868075282D7
TrID 68.5% (.OCX) Windows ActiveX control (116521/4/18)
8.3% (.EXE) Win32 Executable Delphi generic (14182/79/4)
7.7% (.SCR) Windows screen saver (13101/52/3)
6.1% (.EXE) Win64 Executable (generic) (10523/12/4)
2.6% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 27d0d8d6d6d8d023 (11 x RemcosRAT, 6 x DBatLoader, 5 x ModiLoader)
Reporter SecuriteInfoCom
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
266
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the process to interact with network services
Launching a process
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware keylogger obfuscated packed remcos
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-07-21 00:29:45 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Unpacked files
SH256 hash:
e5cee39f56c43d207f40862077d5b015e62929ff21f9de4e45c3b958c8947770
MD5 hash:
0de7dbbda445e257c9169774b9a8000b
SHA1 hash:
23ab78a6fdd513f2b3877efc92a71fe7d44db0db
SH256 hash:
8d8091a9feae64d126b51f3679a838572ea9578dad2255c329c769922025160b
MD5 hash:
21d9a140fb94572d27eec0e394d9720a
SHA1 hash:
385825fa5050290e0e9d5ba0fcd5fe6bfce9e8c8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments