MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a1adbdad4e1d0b04ddbac043a174b0b9e2731402fd9422085243c32c8e575fdf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 10
| SHA256 hash: | a1adbdad4e1d0b04ddbac043a174b0b9e2731402fd9422085243c32c8e575fdf |
|---|---|
| SHA3-384 hash: | 075a1a7f6cd37a0150b5c2262553ec9ee14b20f2cc4813a97ef86c01bf0c4765c2a8f7bc1cabcd3b1821e4049b7376de |
| SHA1 hash: | 0caf24293195aa1f6e90f27be51fb23326a53acc |
| MD5 hash: | 674739cd5807794ca477f7f9f43156ec |
| humanhash: | equal-east-shade-oregon |
| File name: | lista1678,PDF.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 718'848 bytes |
| First seen: | 2021-09-23 20:49:13 UTC |
| Last seen: | 2021-09-23 22:19:58 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9a7ebf1a69de9b324d0d1f73a7d054a0 (6 x RemcosRAT, 1 x Formbook) |
| ssdeep | 12288:mftAn+lE3hGAJNmUaxoSThjc4mQgMM4PW:4uwEwomU1SFA3D |
| Threatray | 199 similar samples on MalwareBazaar |
| TLSH | T15FE47E1AF750A93EF2332838CCC562949927FE4639649C8D19713F257AAD6C07A0B1F7 |
| File icon (PE): | |
| dhash icon | c4dcf8c6d6d0c8d4 (21 x RemcosRAT, 3 x Formbook, 1 x AveMariaRAT) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
lista1678,PDF.exe
Verdict:
Malicious activity
Analysis date:
2021-09-23 20:50:56 UTC
Tags:
rat remcos
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Malware family:
REMCOS
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-23 20:50:07 UTC
AV detection:
16 of 45 (35.56%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 189 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos botnet:blessings persistence rat
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
vegospupm.ddns.net:5632
Unpacked files
SH256 hash:
18498f5add7c31c1af213a720891708124ce271e4a1f4eef7427ff9ceff44767
MD5 hash:
af315fe318bcbca468841006ccc57e0a
SHA1 hash:
9b18984c1d4fcafc7bde26250a937aff6c41a375
SH256 hash:
a1adbdad4e1d0b04ddbac043a174b0b9e2731402fd9422085243c32c8e575fdf
MD5 hash:
674739cd5807794ca477f7f9f43156ec
SHA1 hash:
0caf24293195aa1f6e90f27be51fb23326a53acc
Malware family:
Remcos
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.64
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.