MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9447ec740c00035c0b0e6c32ea86cc4e7585477e5c97f353b42aeee9dafd9cab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 9447ec740c00035c0b0e6c32ea86cc4e7585477e5c97f353b42aeee9dafd9cab
SHA3-384 hash: bad7113b450ad6f35dd51b8a2e3787be4795518a44e9badb3273e346d67a79a028e0681ac1bf128acc8c9c0b51b5589b
SHA1 hash: 9d6aefae4df99363e9d909dc2cd33811e4accad0
MD5 hash: 348af9d5fd2181579c460eebb73ef3ca
humanhash: blue-quebec-ohio-michigan
File name:attack.ps1
Download: download sample
Signature RemcosRAT
File size:5'010 bytes
First seen:2022-05-09 17:21:14 UTC
Last seen:2022-05-09 17:27:20 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:CBn6zALDCn/r4vGXKQuT4vGX1ebB7xxg8PzUPeSy3n5ZWibrE7xxpsGyN5nVJA7J:CB6zVnUujruYlxbnExLAexr1nPnx
Threatray 1'198 similar samples on MalwareBazaar
TLSH T134A112BAF684C5B0C61FE6398248BC1C0520BAC3C2D02DC467BC6C2A9C95FCF6D656C0
Reporter pr0xylife
Tags:ps1 RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
322
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell powershell
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Remcos
Malware Config
C2 Extraction:
freshdirect.dvrlists.com:119
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments