MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f8f4c47c7c63ca412bd23b20853ac7f4c9b69c0c625e5b37c041df1a1f8af8e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemoteManipulator


Vendor detections: 13


Intelligence 13 IOCs YARA 9 File information Comments

SHA256 hash: 9f8f4c47c7c63ca412bd23b20853ac7f4c9b69c0c625e5b37c041df1a1f8af8e
SHA3-384 hash: ccc581e345368158165b059e0aedbe88992f83692426b03e1137b03dca7dee1e04032091cf1b81a0f69b3bffc026f84c
SHA1 hash: 223628b91e70a2e1dc67243b9291a7a6b3881fdb
MD5 hash: 7171107feeac21c8c0cdd17c51779e9d
humanhash: mango-queen-snake-vermont
File name:SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180
Download: download sample
Signature RemoteManipulator
File size:18'024'448 bytes
First seen:2024-10-20 14:30:18 UTC
Last seen:2024-10-20 14:30:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 19b321cb7a9ce31c90397152f38b67ea (29 x RemoteManipulator)
ssdeep 393216:vcfeItVAlkVh+ujtC2L5eemInh91LhWuOy:vwJmun+uRbLI6z5h
TLSH T1F50733C3E7F00849F9BF563695FA1F0C4A3AFCB89A71174D08E4F22564A39561C26B87
TrID 71.9% (.EXE) UPX compressed Win32 Executable (27066/9/6)
11.9% (.EXE) Win32 Executable (generic) (4504/4/1)
5.3% (.EXE) OS/2 Executable (generic) (2029/13)
5.3% (.EXE) Generic Win/DOS Executable (2002/3)
5.3% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
File icon (PE):PE icon
dhash icon c0dacabacac0c244 (20 x RemoteManipulator)
Reporter SecuriteInfoCom
Tags:exe RemoteManipulator

Intelligence


File Origin
# of uploads :
2
# of downloads :
385
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180
Verdict:
Malicious activity
Analysis date:
2024-10-20 14:32:28 UTC
Tags:
rat rms upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Packed Blic Remo
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a file
Launching a process
Modifying a system file
Creating a file in the Windows subdirectories
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Creating a service
Changing a file
Launching a service
DNS request
Connection attempt
Enabling autorun for a service
Result
Verdict:
MALICIOUS
Result
Threat name:
RMSRemoteAdmin
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538149 Sample: SecuriteInfo.com.PUA.Tool.R... Startdate: 20/10/2024 Architecture: WINDOWS Score: 76 42 smtp.meta.ua 2->42 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for dropped file 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 Machine Learning detection for sample 2->54 8 msiexec.exe 112 127 2->8         started        12 rutserv.exe 9 10 2->12         started        15 SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exe 5 2->15         started        signatures3 process4 dnsIp5 34 server_stop_27D787...EA10FB36BB4D2F9.exe, PE32 8->34 dropped 36 server_start_C0086...8A26292A601EBE2.exe, PE32 8->36 dropped 38 server_config_C8E9...5F92E4E3AE550F0.exe, PE32 8->38 dropped 40 46 other files (14 malicious) 8->40 dropped 56 Sample is not signed and drops a device driver 8->56 17 rutserv.exe 2 8->17         started        20 rutserv.exe 2 8->20         started        22 rutserv.exe 2 8->22         started        30 2 other processes 8->30 44 smtp.meta.ua 194.0.131.65, 25 METAUA Ukraine 12->44 24 rfusclient.exe 12->24         started        26 rfusclient.exe 12->26         started        28 msiexec.exe 15->28         started        file6 signatures7 process8 signatures9 46 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 17->46 32 rfusclient.exe 24->32         started        process10
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-09-14 18:02:54 UTC
File Type:
PE (Exe)
Extracted files:
71
AV detection:
13 of 38 (34.21%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery upx
Behaviour
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
UPX packed file
Blocklisted process makes network request
Checks installed software on the system
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a478a62e2cd61bc553bfc9e3f53f98b845e7b03da5d5be10735d5f5cc6e6d926
MD5 hash:
d34f8d5bd61b1106386edeef53a6168c
SHA1 hash:
628ef28e635d12528c74af8d7941640124ea7815
SH256 hash:
9f8f4c47c7c63ca412bd23b20853ac7f4c9b69c0c625e5b37c041df1a1f8af8e
MD5 hash:
7171107feeac21c8c0cdd17c51779e9d
SHA1 hash:
223628b91e70a2e1dc67243b9291a7a6b3881fdb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:pe_detect_tls_callbacks
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemoteManipulator

Executable exe 9f8f4c47c7c63ca412bd23b20853ac7f4c9b69c0c625e5b37c041df1a1f8af8e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteW
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegLoadKeyW

Comments