MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a1a77d48d276da51e97ce070b0d4c08c6f2900e8a2d4c15ce0adb4cff27c2669. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: a1a77d48d276da51e97ce070b0d4c08c6f2900e8a2d4c15ce0adb4cff27c2669
SHA3-384 hash: 7c1734ccee32e1b91b3a0c3603a5e703a73b361b43c876f994f6e546e953dff1bb61d0375a45df558672b6ebcecb8b22
SHA1 hash: a0d32141b0c3bb39ce4f4e6a8d4fb0699341d4e3
MD5 hash: 0be98dc322d842f3f9952ca41c2fe012
humanhash: burger-crazy-finch-winter
File name:saw.bat
Download: download sample
Signature RemcosRAT
File size:2'921'546 bytes
First seen:2024-11-30 20:18:54 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 24576:FYfNclHFdqSgaRDQMErAfBEHuMEIZVx+RCNJXCP+G1dT+pnmSqocVHrO5I8CZ:FqNclHbqS710rAf+uME6AP7xCA
Threatray 115 similar samples on MalwareBazaar
TLSH T11CD55FF738AF17475705639BA78BE96427ABC83747C27EC4C0CAD688400A6DF1960E5E
Magika txt
Reporter JAMESWT_WT
Tags:bat here-industry-wind-greece-trycloudflare-com RemcosRAT WsgiDAV

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
98.2%
Tags:
delphi emotet
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
extrac32 lolbin
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
rans.bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Found large BAT file
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Opens the same file many times (likely Sandbox evasion)
Registers a new ROOT certificate
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Remcos
Sigma detected: Suspicious Creation with Colorcpl
Sigma detected: Suspicious Program Location with Network Connections
Suricata IDS alerts for network traffic
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1565803 Sample: saw.bat Startdate: 30/11/2024 Architecture: WINDOWS Score: 100 83 myumysmeetr.ddns.net 2->83 85 mysweeterbk.ddns.net 2->85 87 6 other IPs or domains 2->87 103 Suricata IDS alerts for network traffic 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 111 14 other signatures 2->111 10 cmd.exe 1 2->10         started        12 Puyiaiob.PIF 2->12         started        15 Puyiaiob.PIF 2->15         started        signatures3 109 Uses dynamic DNS services 85->109 process4 signatures5 17 AnyDesk.PIF 1 6 10->17         started        22 extrac32.exe 1 10->22         started        24 alpha.exe 1 10->24         started        30 5 other processes 10->30 129 Multi AV Scanner detection for dropped file 12->129 131 Writes to foreign memory regions 12->131 133 Allocates memory in foreign processes 12->133 137 2 other signatures 12->137 26 SndVol.exe 12->26         started        135 Allocates many large memory junks 15->135 28 colorcpl.exe 15->28         started        process6 dnsIp7 79 drive.usercontent.google.com 142.250.181.33, 443, 49732 GOOGLEUS United States 17->79 81 drive.google.com 172.217.19.238, 443, 49730, 49731 GOOGLEUS United States 17->81 69 C:\Users\Public\Puyiaiob.url, MS 17->69 dropped 71 C:\Users\Public\Libraries\Puyiaiob, data 17->71 dropped 113 Multi AV Scanner detection for dropped file 17->113 115 Writes to foreign memory regions 17->115 117 Allocates memory in foreign processes 17->117 127 4 other signatures 17->127 32 colorcpl.exe 5 3 17->32         started        36 cmd.exe 1 17->36         started        38 esentutl.exe 2 17->38         started        73 C:\Users\Public\alpha.exe, PE32+ 22->73 dropped 119 Drops PE files to the user root directory 22->119 121 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 22->121 123 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 22->123 40 kn.exe 3 2 24->40         started        125 Detected Remcos RAT 26->125 42 kn.exe 2 30->42         started        44 extrac32.exe 1 30->44         started        file8 signatures9 process10 file11 61 C:\ProgramData\ANYDESKS\logs.dat, data 32->61 dropped 91 Contains functionality to bypass UAC (CMSTPLUA) 32->91 93 Detected Remcos RAT 32->93 95 Contains functionalty to change the wallpaper 32->95 101 5 other signatures 32->101 46 esentutl.exe 2 36->46         started        50 alpha.pif 36->50         started        52 esentutl.exe 2 36->52         started        56 6 other processes 36->56 63 C:\Users\Public\Libraries\Puyiaiob.PIF, PE32 38->63 dropped 54 conhost.exe 38->54         started        97 Registers a new ROOT certificate 40->97 99 Drops PE files with a suspicious file extension 40->99 65 C:\Users\Public\Libraries\AnyDesk.PIF, PE32 42->65 dropped 67 C:\Users\Public\kn.exe, PE32+ 44->67 dropped signatures12 process13 file14 75 C:\Users\Public\alpha.pif, PE32 46->75 dropped 139 Drops PE files to the user root directory 46->139 141 Drops PE files with a suspicious file extension 46->141 143 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 46->143 58 xpha.pif 50->58         started        77 C:\Users\Public\xpha.pif, PE32 52->77 dropped signatures15 process16 dnsIp17 89 127.0.0.1 unknown unknown 58->89
Threat name:
Win32.Trojan.Acll
Status:
Malicious
First seen:
2024-11-30 18:35:41 UTC
File Type:
Text
Extracted files:
1
AV detection:
7 of 23 (30.43%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader discovery persistence trojan
Behaviour
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Modiloader family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BAT_DbatLoader
Author:NDA0E
Description:Detects base64 and hex encoded MZ header used by DbatLoader
Rule name:dbatloader_bat_v2
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments