MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 947365df7a1ad94cfa2029db2c88985f3d34df5b9076e5392eeda08c6f7ba673. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments

SHA256 hash: 947365df7a1ad94cfa2029db2c88985f3d34df5b9076e5392eeda08c6f7ba673
SHA3-384 hash: 20282bb0ee646140ce940e62d49446832b5a7a1c4c46ddd9dbe91e7234ad1cceba42ef17d94e567e73985cab22fcf995
SHA1 hash: c4ac41c6b88baee959e9a8752679a426b8dfa547
MD5 hash: 6109410cc52c8810d9c1175f54a058e4
humanhash: oscar-football-quiet-cup
File name:paymentslip3023.exe
Download: download sample
Signature RemcosRAT
File size:1'940'992 bytes
First seen:2023-11-30 09:30:08 UTC
Last seen:2023-11-30 11:28:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1ef0c64b131c8d58bdaf2bc77d8d5c27 (1 x RemcosRAT)
ssdeep 49152:Ad8fIwCjykkGo5ITnLK+Ey9S1qXtfRGHKpk3H8eiTwHFimH9jIrMKSIa+GGXHIf+:AdoIwkkrITnG69S1qXtfRGHKpk3H8eiD
Threatray 3'056 similar samples on MalwareBazaar
TLSH T11895F016B1B00F37CC2F697D5C1781AA986BBD350F656BC228E47C48BDB55822C6C6CB
TrID 86.8% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.6% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.3% (.SCR) Windows screen saver (13097/50/3)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 54b2b232f39824d6 (1 x RemcosRAT)
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
95.214.26.140:2404

Intelligence


File Origin
# of uploads :
2
# of downloads :
352
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
paymentslip3023.exe
Verdict:
Malicious activity
Analysis date:
2023-11-30 09:33:27 UTC
Tags:
dbatloader rat remcos keylogger stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Remcos
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1350451 Sample: paymentslip3023.exe Startdate: 30/11/2023 Architecture: WINDOWS Score: 100 75 mxzaa.duckdns.org 2->75 77 x30uww.db.files.1drv.com 2->77 79 4 other IPs or domains 2->79 89 Snort IDS alert for network traffic 2->89 91 Multi AV Scanner detection for domain / URL 2->91 93 Found malware configuration 2->93 97 12 other signatures 2->97 12 paymentslip3023.exe 1 7 2->12         started        16 Qxdmnlxb.PIF 2->16         started        18 Qxdmnlxb.PIF 2->18         started        signatures3 95 Uses dynamic DNS services 75->95 process4 file5 65 C:\Users\Public\Libraries\netutils.dll, PE32+ 12->65 dropped 67 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 12->67 dropped 69 C:\Users\Public\Libraries\Qxdmnlxb.PIF, PE32 12->69 dropped 117 Early bird code injection technique detected 12->117 119 Drops PE files with a suspicious file extension 12->119 121 Allocates memory in foreign processes 12->121 127 2 other signatures 12->127 20 SndVol.exe 3 16 12->20         started        25 cmd.exe 1 12->25         started        123 Multi AV Scanner detection for dropped file 16->123 125 Machine Learning detection for dropped file 16->125 27 SndVol.exe 16->27         started        29 colorcpl.exe 18->29         started        signatures6 process7 dnsIp8 81 mxzaa.duckdns.org 95.214.26.140, 2404, 49732, 49747 CMCSUS Germany 20->81 83 geoplugin.net 178.237.33.50, 49735, 80 ATOM86-ASATOM86NL Netherlands 20->83 63 C:\ProgramData\xxxx\logs.dat, data 20->63 dropped 101 Maps a DLL or memory area into another process 20->101 103 Sample uses process hollowing technique 20->103 105 DLL side loading technique detected 20->105 107 Installs a global keyboard hook 20->107 31 SndVol.exe 20->31         started        34 SndVol.exe 20->34         started        36 SndVol.exe 20->36         started        38 SndVol.exe 20->38         started        109 Uses ping.exe to sleep 25->109 111 Drops executables to the windows directory (C:\Windows) and starts them 25->111 113 Uses ping.exe to check the status of other devices and networks 25->113 40 easinvoker.exe 25->40         started        42 PING.EXE 1 25->42         started        45 xcopy.exe 2 25->45         started        48 8 other processes 25->48 file9 signatures10 process11 dnsIp12 129 Tries to steal Instant Messenger accounts or passwords 31->129 131 Tries to steal Mail credentials (via file / registry access) 31->131 133 Tries to harvest and steal browser information (history, passwords, etc) 34->133 50 cmd.exe 1 40->50         started        85 127.0.0.1 unknown unknown 42->85 71 C:\Windows \System32\easinvoker.exe, PE32+ 45->71 dropped 73 C:\Windows \System32\netutils.dll, PE32+ 48->73 dropped file13 signatures14 process15 signatures16 87 Adds a directory exclusion to Windows Defender 50->87 53 cmd.exe 1 50->53         started        56 conhost.exe 50->56         started        process17 signatures18 99 Adds a directory exclusion to Windows Defender 53->99 58 powershell.exe 27 53->58         started        process19 signatures20 115 DLL side loading technique detected 58->115 61 conhost.exe 58->61         started        process21
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2023-11-30 06:56:32 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:xxxx persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
mxzaa.duckdns.org:2404
Unpacked files
SH256 hash:
7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
MD5 hash:
c116d3604ceafe7057d77ff27552c215
SHA1 hash:
452b14432fb5758b46f2897aeccd89f7c82a727d
SH256 hash:
223aef4d05e0002841298ac731cf832a418e88916173cfb27916e1e3dc803a78
MD5 hash:
ebc60cf9c29a10d20b593e56e1e51604
SHA1 hash:
b159f79faafb1cc885c0da227c9e295f8de952fc
Detections:
win_dbatloader_g1 MALWARE_Win_ModiLoader
SH256 hash:
947365df7a1ad94cfa2029db2c88985f3d34df5b9076e5392eeda08c6f7ba673
MD5 hash:
6109410cc52c8810d9c1175f54a058e4
SHA1 hash:
c4ac41c6b88baee959e9a8752679a426b8dfa547
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments