MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 96ab7d863f04da8870f5966a24666f618ebd037dd67e2923dc357e20532149cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 28 File information Comments

SHA256 hash: 96ab7d863f04da8870f5966a24666f618ebd037dd67e2923dc357e20532149cb
SHA3-384 hash: 19ef1c74788b5af83cd0529b7049bbc4feb640a531487cf7472e0c2c319915220ae62fd45855d849c8e6905485f83db4
SHA1 hash: ff5d5ca0c1a0d730315437c2c011409f4f47d8d4
MD5 hash: e3926875f700b99187df8293c0e56de3
humanhash: pip-double-violet-five
File name:Passhyr.exe
Download: download sample
Signature RemcosRAT
File size:453'016 bytes
First seen:2026-03-16 08:14:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 46ce5c12b293febbeb513b196aa7f843 (20 x GuLoader, 12 x RemcosRAT, 5 x VIPKeylogger)
ssdeep 6144:yX45rw6DCfCZWwg3xeerANu/vACz+ihxCw1ntBKhoudsbUsS6hXdyaRfvBup/Apr:yX4Rrghlg7axDvMou2YsS0caY7VI
Threatray 2'540 similar samples on MalwareBazaar
TLSH T1EBA41224378ADAA6E844057140B1E3F6A4B2BEB116550B8B7F58BF5E7C312C19E0B35B
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter lowmal3
Tags:exe RemcosRAT signed

Code Signing Certificate

Organisation:Ungloomily
Issuer:Ungloomily
Algorithm:sha256WithRSAEncryption
Valid from:2026-02-04T10:41:59Z
Valid to:2027-02-04T10:41:59Z
Serial number: cdcb2e302c9e1dbe382b27141c1b0323be466c
Thumbprint Algorithm:SHA256
Thumbprint: 8818333b9d5960d390a4a7914d80ba719e6aa8c9c19b2ad733e64d91f15d733a
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
192
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
GuLoader NSIS
Details
GuLoader
a c2 URL, a useragent string, and a string XOR key
GuLoader
an XOR decryption key and an extracted component
NSIS
extracted archive contents
Malware family:
ID:
1
File name:
_96ab7d863f04da8870f5966a24666f618ebd037dd67e2923dc357e20532149cb.exe
Verdict:
Malicious activity
Analysis date:
2026-03-16 08:15:47 UTC
Tags:
auto-reg rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
injection obfusc crypt
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Searching for the window
Creating a file
Delayed reading of the file
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug guloader installer installer installer-heuristic microsoft_visual_cc nsis obfuscated signed soft-404
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan-Downloader.Win32.Minix.cjt PDM:Trojan.Win32.Generic Trojan-Downloader.Win32.Minix.sb Trojan.NSIS.Makoob.sbb Trojan.Win32.Guloader.sb Trojan.NSIS.Makoob.sbd Trojan.NSIS.Makoob.sba Packed.NSIS.Krynis.sb Backdoor.Win32.Remcos.sb
Result
Threat name:
GuLoader, Remcos
Detection:
malicious
Classification:
troj.evad.phis.spyw
Score:
100 / 100
Signature
AI detected suspicious PE digital signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Detected Remcos RAT
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Writes to foreign memory regions
Yara detected GuLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1884096 Sample: Passhyr.exe Startdate: 16/03/2026 Architecture: WINDOWS Score: 100 87 drive.usercontent.google.com 2->87 89 drive.google.com 2->89 97 Suricata IDS alerts for network traffic 2->97 99 Found malware configuration 2->99 101 Antivirus detection for dropped file 2->101 103 8 other signatures 2->103 10 Passhyr.exe 3 27 2->10         started        14 remcos.exe 19 2->14         started        16 remcos.exe 19 2->16         started        18 remcos.exe 2->18         started        signatures3 process4 file5 79 C:\Users\user\AppData\Local\...\System.dll, PE32 10->79 dropped 131 Tries to detect virtualization through RDTSC time measurements 10->131 133 Unusual module load detection (module proxying) 10->133 135 Switches to a custom stack to bypass stack traces 10->135 20 Passhyr.exe 2 10 10->20         started        25 Passhyr.exe 10->25         started        81 C:\Users\user\AppData\Local\...\System.dll, PE32 14->81 dropped 27 remcos.exe 6 14->27         started        29 remcos.exe 14->29         started        83 C:\Users\user\AppData\Local\...\System.dll, PE32 16->83 dropped 31 remcos.exe 16->31         started        33 remcos.exe 16->33         started        85 C:\Users\user\AppData\Local\...\System.dll, PE32 18->85 dropped 35 remcos.exe 18->35         started        37 remcos.exe 18->37         started        signatures6 process7 dnsIp8 93 drive.usercontent.google.com 142.251.40.225, 443, 49750, 49752 GOOGLEUS United States 20->93 95 drive.google.com 142.251.40.238, 443, 49749, 49751 GOOGLEUS United States 20->95 73 C:\ProgramData\Remcos\remcos.exe, PE32 20->73 dropped 75 C:\ProgramData\...\remcos.exe:Zone.Identifier, ASCII 20->75 dropped 111 Detected Remcos RAT 20->111 113 Creates autostart registry keys with suspicious names 20->113 39 remcos.exe 19 20->39         started        43 Passhyr.exe 20->43         started        45 remcos.exe 27->45         started        47 remcos.exe 31->47         started        49 remcos.exe 35->49         started        file9 signatures10 process11 file12 77 C:\Users\user\AppData\Local\...\System.dll, PE32 39->77 dropped 115 Multi AV Scanner detection for dropped file 39->115 117 Found hidden mapped module (file has been removed from disk) 39->117 119 Tries to detect virtualization through RDTSC time measurements 39->119 121 2 other signatures 39->121 51 remcos.exe 4 10 39->51         started        56 remcos.exe 39->56         started        signatures13 process14 dnsIp15 91 31.57.216.44, 2404, 49756, 49757 RASANAIR Iran (ISLAMIC Republic Of) 51->91 67 C:\Users\user\AppData\Local\Temp\TH7B37.tmp, MS-DOS 51->67 dropped 69 C:\Users\user\AppData\Local\Temp\TH7AF8.tmp, MS-DOS 51->69 dropped 71 C:\Users\user\AppData\Local\Temp\TH7A99.tmp, MS-DOS 51->71 dropped 105 Detected Remcos RAT 51->105 107 Writes to foreign memory regions 51->107 109 Maps a DLL or memory area into another process 51->109 58 userinit.exe 51->58         started        61 userinit.exe 51->61         started        63 userinit.exe 51->63         started        65 remcos.exe 51->65         started        file16 signatures17 process18 signatures19 123 Tries to harvest and steal browser information (history, passwords, etc) 58->123 125 Unusual module load detection (module proxying) 58->125 127 Tries to steal Instant Messenger accounts or passwords 61->127 129 Tries to steal Mail credentials (via file / registry access) 61->129
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:remotehost collection discovery downloader persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks installed software on the system
Contacts third-party web service commonly abused for C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Detected Nirsoft tools
Guloader family
Guloader,Cloudeye
Remcos
Remcos family
Malware Config
C2 Extraction:
31.57.216.44:2404
Unpacked files
SH256 hash:
96ab7d863f04da8870f5966a24666f618ebd037dd67e2923dc357e20532149cb
MD5 hash:
e3926875f700b99187df8293c0e56de3
SHA1 hash:
ff5d5ca0c1a0d730315437c2c011409f4f47d8d4
SH256 hash:
8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c
MD5 hash:
9b38a1b07a0ebc5c7e59e63346ecc2db
SHA1 hash:
97332a2ffcf12a3e3f27e7c05213b5d7faa13735
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Remcos_unpacked_PulseIntel
Author:PulseIntel
Description:Remcos Payload
Rule name:Sus_All_Windows_PE_Malware
Author:DiegoAnalytics
Description:Detects Windows PE malware of all types, avoids non-executables like .html
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:Windows_Trojan_Remcos_921ef449
Author:Elastic Security
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.
Rule name:win_remcos_rat_unpacked
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:win_remcos_w0
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:yarahub_win_remcos_rat_unpacked_aug_2023
Author:Matthew @ Embee_Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 96ab7d863f04da8870f5966a24666f618ebd037dd67e2923dc357e20532149cb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments