MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b18ec35cd15fc61fa3ab053e2d83994c78cb7a7f66a3560bae910550463c039. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 9b18ec35cd15fc61fa3ab053e2d83994c78cb7a7f66a3560bae910550463c039
SHA3-384 hash: 98ba5f8db65724d4a75cabae33d61601fc2d68230f23899399520df9471897e79d63f83e13ff68cfae7ac24229264f98
SHA1 hash: 97dc52f9cf1571383abbc373020e1750dddc25ce
MD5 hash: f7254a9c08493d0d105dfb942b7a0137
humanhash: carbon-purple-montana-mexico
File name:PDA FORMAT PDF.zip
Download: download sample
Signature RemcosRAT
File size:362'665 bytes
First seen:2021-08-10 09:06:06 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:l+8J4dJZ5rq74bvKZKgODJ++zzqurh0V+WPzvIY+u3D+B8wsccBtSoPG:ALdtDbCKDhaYhozvlxT+BVsccDm
TLSH T14B74237433B8E2493372C9693E32D1A225EB11D235A361E1927B976F9FC39867320177
Reporter cocaman
Tags:RemcosRAT zip


Avatar
cocaman
Malicious email (T1566.001)
From: ""Xuming"<xuming@pgshpg.com>" (likely spoofed)
Received: "from pgshpg.com (unknown [136.144.41.60]) "
Date: "10 Aug 2021 01:48:20 -0700"
Subject: "DISCHARGE 25500MT STEEL BILLETS AT ZHANGJIAGANG PORT"
Attachment: "PDA FORMAT PDF.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
280
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-10 07:59:15 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
12 of 45 (26.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:remcos botnet:host persistence rat suricata
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Async RAT payload
AsyncRat
Remcos
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Remcos RAT Checkin 23
Malware Config
C2 Extraction:
127.0.0.1:2510
194.5.98.81:2510
194.5.98.81:7123
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

zip 9b18ec35cd15fc61fa3ab053e2d83994c78cb7a7f66a3560bae910550463c039

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
RemcosRAT

Comments