MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8fce82f738c186f70e4d9866b011e0c16842bdc591ced3b627092e0a5444c3ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 13


Intelligence 13 IOCs YARA 13 File information Comments

SHA256 hash: 8fce82f738c186f70e4d9866b011e0c16842bdc591ced3b627092e0a5444c3ce
SHA3-384 hash: d67ba8bc18d2beea0cbe51370c03058c58a7b055daea4dacde9c39d297bc8ea255f79cf0e791227da2af2507f62cdece
SHA1 hash: 6012fd6165dc1e96ecc902a57787e3e59a655b86
MD5 hash: 9d52bb297e5dfb510b26c852af17e7f5
humanhash: romeo-eleven-item-blossom
File name:9d52bb297e5dfb510b26c852af17e7f5.dll
Download: download sample
Signature RemcosRAT
File size:3'761'664 bytes
First seen:2026-02-09 06:41:12 UTC
Last seen:2026-02-09 07:35:14 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash b268d030a3e79bd13d19a3729b6a8237 (1 x RemcosRAT)
ssdeep 49152:a7iMkSLBaqWsUldGEJBMzMuUoPo3lzLrFRmxWsQzUZjYAyGMYzDOA7qXgG8Fj:a7i01tUWOBoDe3Z/mQYZE
TLSH T13D06BE43FF8255F2E9CA417922E79B7F4E394D14A72489D3DBA018A9C8311D0A73F798
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:dll RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
132
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
91.7%
Tags:
shellcode smtp
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
DNS request
Connection attempt
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypto expand lolbin microsoft_visual_cc packed
Verdict:
Malicious
File Type:
dll x32
First seen:
2026-02-06T08:48:00Z UTC
Last seen:
2026-02-09T07:01:00Z UTC
Hits:
~100
Detections:
Trojan-Spy.Win32.Xegumumune.sbc Trojan.Win64.DLLhijack.sb Trojan.Win32.DLLhijack.sb Backdoor.Win32.Remcos.sb Backdoor.Win32.Remcos.e Backdoor.Win32.Remcos.abjj
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Found malware configuration
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Potential WinAPI Calls Via CommandLine
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1865872 Sample: C4v4e9NOX4.dll Startdate: 09/02/2026 Architecture: WINDOWS Score: 100 35 wetransferbackups9669.com 2->35 37 ibulattste.com 2->37 39 2 other IPs or domains 2->39 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 7 other signatures 2->53 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 rundll32.exe 4 4 9->14         started        17 cmd.exe 1 9->17         started        19 13 other processes 9->19 dnsIp6 55 Contains functionality to bypass UAC (CMSTPLUA) 11->55 57 Contains functionalty to change the wallpaper 11->57 59 Contains functionality to steal Chrome passwords or cookies 11->59 65 2 other signatures 11->65 21 WerFault.exe 20 16 11->21         started        41 ibulattste.com 178.16.53.98, 443, 49791, 49792 DUSNET-ASDE Germany 14->41 43 api.github.com 140.82.114.5, 443, 49729, 49733 GITHUBUS United States 14->43 45 127.0.0.1 unknown unknown 14->45 61 System process connects to network (likely due to code injection or exploit) 14->61 63 Installs a global keyboard hook 14->63 23 rundll32.exe 17->23         started        25 WerFault.exe 16 19->25         started        27 WerFault.exe 16 19->27         started        29 WerFault.exe 19->29         started        31 2 other processes 19->31 signatures7 process8 process9 33 WerFault.exe 18 23->33         started       
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2026-02-06 13:37:51 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
8fce82f738c186f70e4d9866b011e0c16842bdc591ced3b627092e0a5444c3ce
MD5 hash:
9d52bb297e5dfb510b26c852af17e7f5
SHA1 hash:
6012fd6165dc1e96ecc902a57787e3e59a655b86
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments