MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9952b6faf8f8cba0b3e303a0aafc05928174565eadc070ff4874db0e02820658. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments 1

SHA256 hash: 9952b6faf8f8cba0b3e303a0aafc05928174565eadc070ff4874db0e02820658
SHA3-384 hash: 8aa87ad1461dd71c3236a0d6fb02da3e0014d7d7f2bdd0779b56dde0718cf8de5c0ebf72f4eec9515880f189aa85feff
SHA1 hash: 2d9a1c315e746d0bc4a6d44f10b51415a2decd12
MD5 hash: e247bcb666351b5b246c58d9e4137a6a
humanhash: vermont-delta-carbon-earth
File name:e247bcb666351b5b246c58d9e4137a6a
Download: download sample
Signature RemcosRAT
File size:1'120'256 bytes
First seen:2023-02-01 16:07:13 UTC
Last seen:2023-02-01 17:37:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:geqassUeD9lNq6PYytOOaVZ/y0hr8zw6R7c4N34kl:gUsbmlNF/RC/Jhr8zPl
Threatray 4'836 similar samples on MalwareBazaar
TLSH T19F358C4137B19472F1DB05B91128768C2E3D7403A6E6E2665BBB39C49703AF7F298F12
TrID 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.1% (.SCR) Windows screen saver (13097/50/3)
8.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8219e62b2bc61982 (10 x AgentTesla, 4 x Formbook, 3 x Loki)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
ATTACHMENT5678.xlsx
Verdict:
Malicious activity
Analysis date:
2023-02-01 10:43:22 UTC
Tags:
exploit cve-2017-11882 loader rat remcos stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Running batch commands
Verdict:
No Threat
Threat level:
  2/10
Confidence:
67%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates autostart registry keys with suspicious names
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 796183 Sample: gNuRbiTQf0.exe Startdate: 01/02/2023 Architecture: WINDOWS Score: 100 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus detection for dropped file 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 6 other signatures 2->63 10 gNuRbiTQf0.exe 3 2->10         started        14 trs.exe 2 2->14         started        16 trs.exe 2 2->16         started        18 trs.exe 2->18         started        process3 file4 49 C:\Users\user\AppData\...\gNuRbiTQf0.exe.log, ASCII 10->49 dropped 75 Contains functionality to steal Chrome passwords or cookies 10->75 77 Contains functionality to steal Firefox passwords or cookies 10->77 79 Injects a PE file into a foreign processes 10->79 81 Delayed program exit found 10->81 20 gNuRbiTQf0.exe 5 4 10->20         started        24 trs.exe 14->24         started        26 trs.exe 16->26         started        28 trs.exe 18->28         started        signatures5 process6 file7 43 C:\Users\user\AppData\Roaming\trs.exe, PE32 20->43 dropped 45 C:\Users\user\...\trs.exe:Zone.Identifier, ASCII 20->45 dropped 47 C:\...\cpxobmtlkdzlnxvgvxstufttydfjs.vbs, data 20->47 dropped 71 Creates autostart registry keys with suspicious names 20->71 30 wscript.exe 1 20->30         started        signatures8 process9 process10 32 cmd.exe 1 30->32         started        process11 34 trs.exe 3 32->34         started        37 conhost.exe 32->37         started        signatures12 65 Multi AV Scanner detection for dropped file 34->65 67 Machine Learning detection for dropped file 34->67 69 Injects a PE file into a foreign processes 34->69 39 trs.exe 2 15 34->39         started        process13 dnsIp14 51 craigjonson1.gotdns.ch 194.180.49.19, 2011, 49703 LVLT-10753US Germany 39->51 53 geoplugin.net 178.237.33.50, 49704, 80 ATOM86-ASATOM86NL Netherlands 39->53 55 192.168.2.1 unknown unknown 39->55 73 Installs a global keyboard hook 39->73 signatures15
Threat name:
Win32.Trojan.Casdet
Status:
Malicious
First seen:
2023-02-01 14:41:31 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
17 of 39 (43.59%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:eric-host 2023 persistence rat
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
craigjonson1.gotdns.ch:2011
Unpacked files
SH256 hash:
e8b2f434ad6f440274d5f5fb18a2f424bf8492e9b77883eeae0b7e2922bf714a
MD5 hash:
81318d806255e9af95c2f35a1b51db08
SHA1 hash:
7cc095b244400aae50faa0c95d775fb182bfff9b
SH256 hash:
f8e2228b2d865f9fc5e43be28b300a6aaefbf23e7ef84e457c7fe7834faf3d67
MD5 hash:
5766721e78d31d18fa1ecb3fa2f38a2b
SHA1 hash:
f3039c8c140e988f9c5ffb14c4c28d2a3c422629
SH256 hash:
11487860ba3aba2b4c1e025437985717474cc7e812ee38bec6877e510e384427
MD5 hash:
ae4a4d88b34340caab8f04934032607b
SHA1 hash:
304cd865b59bbdf5b2a9b523a363681c3f37ab0c
SH256 hash:
ff1b42ea7d56a37eae801adbddb7116f52a4664c0b41302736f522852edc2747
MD5 hash:
89ac57478044c57c7195943116a521e0
SHA1 hash:
1ff2bafeed795423e3538d810bda8e1e3fcdcfa5
SH256 hash:
9952b6faf8f8cba0b3e303a0aafc05928174565eadc070ff4874db0e02820658
MD5 hash:
e247bcb666351b5b246c58d9e4137a6a
SHA1 hash:
2d9a1c315e746d0bc4a6d44f10b51415a2decd12
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 9952b6faf8f8cba0b3e303a0aafc05928174565eadc070ff4874db0e02820658

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-01 16:07:16 UTC

url : hxxp://85.208.136.4/EDP.exe