MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a750dd5c0f9cfaf59331c095bacf292d6621ebd094da752cefca4238613924d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 9a750dd5c0f9cfaf59331c095bacf292d6621ebd094da752cefca4238613924d
SHA3-384 hash: c948b8d1c0e9169a524453b686c7110d32800c1aae7b8f4e1966a3777feaf093398f477234b36532c8487ba05f964c78
SHA1 hash: 78ccd1d0a91121dc5c1c1c025ab61beb9fef7f6c
MD5 hash: ab1b05a626d2a43ac91935c0366aa49a
humanhash: jupiter-uranus-oranges-zulu
File name:ab1b05a626d2a43ac91935c0366aa49a.exe
Download: download sample
Signature RemcosRAT
File size:1'532'928 bytes
First seen:2022-06-22 15:06:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'741 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:dciSZRH5GpWrDjOLC7lqHNXnpRaEzMSFJPB6RUP+Q3go0nP4bvhFVODn:dgh5AcjV7lqt3jaEzDFJURU13H4P4tXc
Threatray 2'922 similar samples on MalwareBazaar
TLSH T1F165CF5A67C4AD92ECE45B3E91FB0B61A692DFB76C2FA3071100A43D0B2B5CD3F61485
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f2cecc8e86cce892 (6 x DanaBot, 1 x CyberGate, 1 x RemcosRAT)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Creating a file
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 650513 Sample: YWQSYKhOvI.exe Startdate: 22/06/2022 Architecture: WINDOWS Score: 100 44 imranmhemoodcheema.ddns.net 2->44 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for URL or domain 2->50 52 Antivirus detection for dropped file 2->52 54 10 other signatures 2->54 9 YWQSYKhOvI.exe 5 2->9         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\winrar-x64-611.exe, PE32 9->38 dropped 40 C:\...\winrar-x64-611.exe:Zone.Identifier, ASCII 9->40 dropped 42 C:\Users\user\AppData\...\YWQSYKhOvI.exe.log, ASCII 9->42 dropped 58 Creates an undocumented autostart registry key 9->58 60 Writes to foreign memory regions 9->60 62 Injects a PE file into a foreign processes 9->62 13 RegAsm.exe 2 9->13         started        16 cmd.exe 1 9->16         started        18 RegAsm.exe 9->18         started        signatures6 process7 signatures8 64 Injects a PE file into a foreign processes 13->64 20 RegAsm.exe 2 2 13->20         started        24 cmd.exe 1 13->24         started        26 RegAsm.exe 13->26         started        32 2 other processes 13->32 28 conhost.exe 16->28         started        30 timeout.exe 1 16->30         started        process9 dnsIp10 46 imranmhemoodcheema.ddns.net 192.227.225.175, 49825, 49834, 49837 AS-COLOCROSSINGUS United States 20->46 56 Installs a global keyboard hook 20->56 34 conhost.exe 24->34         started        36 timeout.exe 1 24->36         started        signatures11 process12
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-06-22 09:29:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
33
AV detection:
26 of 41 (63.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:richmind rat
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Remcos
Malware Config
C2 Extraction:
imranmhemoodcheema.ddns.net:9830
Unpacked files
SH256 hash:
79d5eaf80f529c7c1575d8d33b79052c866229d8d249a8a4eff0f796af9e07e9
MD5 hash:
c09473004770fa15d192839781e1b96b
SHA1 hash:
7dd7ba2a9fca438a6138f1a61cb4d94c69d830e7
SH256 hash:
b25e22b172fb1e3f38ef417d1b63712918deebd26e36a0b9064e262d2c5abf95
MD5 hash:
ce1d8ab7ed398c8c68c17760f2ec5069
SHA1 hash:
4394eb270544b7b07aa9d4ee4c0b73ff80283816
Detections:
win_remcos_auto
SH256 hash:
ce2c2b8f1a258acb23435ec1b3aa1cdb2cd3851ad8c0472381ce63a2dcea75e7
MD5 hash:
493ede0c3a372ae7f4fd36a194c72f29
SHA1 hash:
2ab57708471608aea7d7a778290c2b5d68e03300
SH256 hash:
9868a98e454f86d9777305af613c49e18c73235c7c1e612d42ac2876103caa18
MD5 hash:
fc141fea508494bd3542dd5ac80f5bfd
SHA1 hash:
76ce1b2303d29e601b37bccde33e322b2e7e8fa8
SH256 hash:
486a2dbcbc90f51f88407d063c57fc887e226fde2305d21cc758ad2a744c73fa
MD5 hash:
388ebccff80fa90785bc15b321cc9676
SHA1 hash:
161c6ae959c0245e91fc56bf247a7f1801cafa1b
SH256 hash:
9a750dd5c0f9cfaf59331c095bacf292d6621ebd094da752cefca4238613924d
MD5 hash:
ab1b05a626d2a43ac91935c0366aa49a
SHA1 hash:
78ccd1d0a91121dc5c1c1c025ab61beb9fef7f6c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 9a750dd5c0f9cfaf59331c095bacf292d6621ebd094da752cefca4238613924d

(this sample)

  
Delivery method
Distributed via web download

Comments