MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9502b93f782ae19b93623605f74ebc2ee277a453ecd2286ef990d62c28a601e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 9 File information Comments

SHA256 hash: 9502b93f782ae19b93623605f74ebc2ee277a453ecd2286ef990d62c28a601e6
SHA3-384 hash: 0093d8e88a09b003e88e51e18682de569937951388f3a474c9b540cc44ae433e20e1779a6c6eeec004252d9677636408
SHA1 hash: 79001a0461a160e6730693d636a62f5c1c70aea2
MD5 hash: af85ddcc745d5d4e1f85c71018672fbd
humanhash: echo-utah-bravo-wyoming
File name:atikmdag-patcher-1.4.8.exe
Download: download sample
Signature RemcosRAT
File size:5'842'029 bytes
First seen:2021-01-05 22:23:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 98304:qlY+ysrUpTEAlpvtzcBqchxlsfojqevOndlecwdHHh9djjE:slqoivhcwDQ/iGHHTdk
Threatray 1'665 similar samples on MalwareBazaar
TLSH F6463312FCC25975D9211B310A2D8B50583E7D397F2CCAEF93E0956CEE754D0BA70AA2
Reporter o2genum
Tags:exe RemcosRAT


Avatar
o2genum
Distributed as ZIP.
Packed into a SFX RAR for analysis.

Intelligence


File Origin
# of uploads :
1
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
atikmdag-patcher-1.4.8.exe
Verdict:
Malicious activity
Analysis date:
2021-01-05 22:28:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Deleting a recently created file
Creating a file
Moving a recently created file
Enabling the 'hidden' option for files in the %temp% directory
Sending a UDP request
Launching a process
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Hijacks the control flow in another process
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Uses nslookup.exe to query domains
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 336392 Sample: atikmdag-patcher-1.4.8.exe Startdate: 05/01/2021 Architecture: WINDOWS Score: 100 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 Detected Remcos RAT 2->54 56 2 other signatures 2->56 10 atikmdag-patcher-1.4.8.exe 15 2->10         started        process3 file4 40 C:\Users\user\...\atikmdag-patcher.exe, PE32 10->40 dropped 13 atikmdag-patcher.exe 3 13 10->13         started        process5 file6 46 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->46 dropped 16 atikmdag-patcher.exe 5 14 13->16         started        process7 file8 34 C:\Users\user\AppData\Local\...\is-HM322.tmp, PE32 16->34 dropped 36 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 16->36 dropped 38 C:\Users\user\AppData\Local\...\is-23RV1.tmp, PE32 16->38 dropped 19 User Help Services.exe 16->19         started        22 atikmdag-patcher.exe 16->22         started        process9 signatures10 58 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 19->58 60 Hijacks the control flow in another process 19->60 62 Uses nslookup.exe to query domains 19->62 64 2 other signatures 19->64 24 nslookup.exe 1 19->24         started        process11 signatures12 66 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 24->66 68 Hijacks the control flow in another process 24->68 70 Writes to foreign memory regions 24->70 72 Maps a DLL or memory area into another process 24->72 27 cmd.exe 2 6 24->27         started        32 conhost.exe 24->32         started        process13 dnsIp14 48 95.154.196.12, 49745, 5851 IOMART-ASGB United Kingdom 27->48 42 C:\Users\user\AppData\Roaming\...\vmtools.exe, PE32 27->42 dropped 44 C:\Users\user\AppData\...\libcrypto-1_1.dll, PE32 27->44 dropped 74 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->74 76 Contains functionality to steal Chrome passwords or cookies 27->76 78 Contains functionality to capture and log keystrokes 27->78 80 2 other signatures 27->80 file15 signatures16
Result
Malware family:
Score:
  10/10
Tags:
family:remcos rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
Blocklisted process makes network request
Remcos
Malware Config
C2 Extraction:
95.154.196.12:5851
Unpacked files
SH256 hash:
9502b93f782ae19b93623605f74ebc2ee277a453ecd2286ef990d62c28a601e6
MD5 hash:
af85ddcc745d5d4e1f85c71018672fbd
SHA1 hash:
79001a0461a160e6730693d636a62f5c1c70aea2
SH256 hash:
57263d93f0b17f4c4392a01877941a3929bf9ba68b7a74b6391bf6afd3ed25d0
MD5 hash:
ba541100e50698dd5d6aca9cd91365f9
SHA1 hash:
828c3f022ead6dd4743df7d741acbea543243d64
SH256 hash:
43203bd6e3b6fcc62a5d541464fe4660d1c7081339f91f7acedd0f9d046927ae
MD5 hash:
f440639dbd6d2f4acd69a3bfffb0a8ec
SHA1 hash:
869a796997077b5013379963a990452eee052c72
SH256 hash:
476ee34ee6778452d4a66295a6d5f425dff80130c3cd71c62225f9ed3f4b332b
MD5 hash:
b50f36ec53cdc8ec24cb7f4224de8d19
SHA1 hash:
6bcd00f674b0c0328fafc5c8c93b6625454bce20
SH256 hash:
c7fbdc61eb62c05e40295617e2db75877672931f751a770d2629e6eab6075f2c
MD5 hash:
abf6c724b20844d5b0073988a58faf1e
SHA1 hash:
7a8269d5b2ae623f8148ce9863f48f7e12ce036b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 9502b93f782ae19b93623605f74ebc2ee277a453ecd2286ef990d62c28a601e6

(this sample)

Comments