MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a35234d3e33acbb7e53abaec38ced3a45f6df0ad5ee17ba52b49478d0418f1da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 19


Intelligence 19 IOCs YARA 5 File information Comments

SHA256 hash: a35234d3e33acbb7e53abaec38ced3a45f6df0ad5ee17ba52b49478d0418f1da
SHA3-384 hash: 34af2b3648bc9f459c453287a953f7c88b448c39bb639c8ebd2de2ef44890af4f16801ff36b86e5fba1c05f4bfe9b5ba
SHA1 hash: 7cf9a2a412aa3bb5f78f19ba419551faad4758f2
MD5 hash: 90133947ec6add62c5d9b23c475f602f
humanhash: princess-arizona-autumn-november
File name:Payment_Slip.pdf.exe
Download: download sample
Signature RemcosRAT
File size:946'688 bytes
First seen:2025-03-15 16:04:49 UTC
Last seen:2025-03-15 16:47:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'453 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 24576:MsquOU52A60axyq+goZGrub/wz5dUfeM8jO:uU5PC+/8LUX8jO
Threatray 1'079 similar samples on MalwareBazaar
TLSH T1D31512A9EAEAC9A2DD4517F01C73E2F1036C9F4DD110D7038EED9CDB78536623228999
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon f4acec8cd6e8f4d4 (3 x RemcosRAT)
Reporter BastianHein
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
413
Origin country :
CL CL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
f88f0c615bc919d70dbfdadae5d7a85715ca4fc0444cbd1cd0f2a63d895b60c3
Verdict:
Malicious activity
Analysis date:
2025-03-15 15:43:07 UTC
Tags:
arch-exec rat remcos remote autorun-sched

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
underscore remcos
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Restart of the analyzed sample
Creating a file
Setting a keyboard event handler
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a process from a recently created file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
masquerade obfuscated packed packed packer_detected remcos
Verdict:
Malicious
Labled as:
MSIL/Kryptik_AGeneric.DKC trojan
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, AgentTesla
Detection:
malicious
Classification:
rans.phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates multiple autostart registry keys
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected Telegram RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1639467 Sample: Payment_Slip.pdf.exe Startdate: 15/03/2025 Architecture: WINDOWS Score: 100 81 api.telegram.org 2->81 83 ratianaana701.bounceme.net 2->83 85 3 other IPs or domains 2->85 117 Suricata IDS alerts for network traffic 2->117 119 Found malware configuration 2->119 121 Malicious sample detected (through community Yara rule) 2->121 125 20 other signatures 2->125 8 Payment_Slip.pdf.exe 7 2->8         started        12 mHTmhPhJy.exe 5 2->12         started        14 mykksg.exe 2->14         started        16 4 other processes 2->16 signatures3 123 Uses the Telegram API (likely for C&C communication) 81->123 process4 dnsIp5 63 C:\Users\user\AppData\Roaming\mHTmhPhJy.exe, PE32 8->63 dropped 65 C:\Users\...\mHTmhPhJy.exe:Zone.Identifier, ASCII 8->65 dropped 67 C:\Users\user\AppData\Local\...\tmp2819.tmp, XML 8->67 dropped 69 C:\Users\user\...\Payment_Slip.pdf.exe.log, ASCII 8->69 dropped 137 Tries to steal Mail credentials (via file registry) 8->137 139 Uses schtasks.exe or at.exe to add and modify task schedules 8->139 159 2 other signatures 8->159 19 Payment_Slip.pdf.exe 2 20 8->19         started        24 powershell.exe 23 8->24         started        26 schtasks.exe 1 8->26         started        141 Multi AV Scanner detection for dropped file 12->141 143 Contains functionalty to change the wallpaper 12->143 145 Contains functionality to steal Chrome passwords or cookies 12->145 161 3 other signatures 12->161 28 mHTmhPhJy.exe 12->28         started        30 schtasks.exe 1 12->30         started        147 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->147 149 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->149 151 Tries to steal Mail credentials (via file / registry access) 14->151 71 127.0.0.1 unknown unknown 16->71 153 Tries to harvest and steal ftp login credentials 16->153 155 Tries to harvest and steal browser information (history, passwords, etc) 16->155 157 Installs a global keyboard hook 16->157 file6 signatures7 process8 dnsIp9 87 ratianaana701.bounceme.net 103.186.117.228, 49720, 49721, 49722 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 19->87 89 geoplugin.net 178.237.33.50, 49726, 80 ATOM86-ASATOM86NL Netherlands 19->89 55 C:\Users\user\AppData\Roaming\host.exe, PE32 19->55 dropped 57 C:\Users\user\AppData\Local\Temp\dwn.exe, PE32 19->57 dropped 59 C:\Users\user\AppData\Local\...\conserver.exe, PE32 19->59 dropped 61 C:\ProgramData\remcos\logs.dat, data 19->61 dropped 127 Detected Remcos RAT 19->127 129 Maps a DLL or memory area into another process 19->129 131 Sample uses process hollowing technique 19->131 133 Installs a global keyboard hook 19->133 32 conserver.exe 19->32         started        37 host.exe 19->37         started        39 dwn.exe 19->39         started        49 3 other processes 19->49 135 Loading BitLocker PowerShell Module 24->135 41 WmiPrvSE.exe 24->41         started        43 conhost.exe 24->43         started        45 conhost.exe 26->45         started        47 conhost.exe 30->47         started        file10 signatures11 process12 dnsIp13 73 smtp.gmail.com 66.102.1.109, 49731, 49736, 49740 GOOGLEUS United States 32->73 75 74.125.71.108, 49766, 49770, 587 GOOGLEUS United States 32->75 51 C:\Users\user\AppData\...\Windows Update.exe, PE32 32->51 dropped 91 Antivirus detection for dropped file 32->91 93 Multi AV Scanner detection for dropped file 32->93 95 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->95 113 2 other signatures 32->113 77 api.telegram.org 149.154.167.220, 443, 49733, 49735 TELEGRAMRU United Kingdom 37->77 79 api.ipify.org 104.26.12.205, 443, 49730, 49742 CLOUDFLARENETUS United States 37->79 53 C:\Users\user\AppData\Roaming\...\mykksg.exe, PE32 37->53 dropped 97 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 37->97 99 Tries to steal Mail credentials (via file / registry access) 37->99 101 Creates multiple autostart registry keys 37->101 103 Detected Remcos RAT 39->103 105 Contains functionalty to change the wallpaper 39->105 107 Contains functionality to steal Chrome passwords or cookies 39->107 115 2 other signatures 39->115 109 Tries to steal Instant Messenger accounts or passwords 49->109 111 Tries to harvest and steal browser information (history, passwords, etc) 49->111 file14 signatures15
Threat name:
Win32.Trojan.CrypterX
Status:
Malicious
First seen:
2025-03-15 15:43:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:agenttesla family:remcos botnet:march 15 collection credential_access discovery execution keylogger persistence rat spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Detected Nirsoft tools
NirSoft MailPassView
NirSoft WebBrowserPassView
AgentTesla
Agenttesla family
Remcos
Remcos family
Malware Config
C2 Extraction:
ratianaana701.bounceme.net:9373
milala.duckdns.org:9373
https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/
Unpacked files
SH256 hash:
a35234d3e33acbb7e53abaec38ced3a45f6df0ad5ee17ba52b49478d0418f1da
MD5 hash:
90133947ec6add62c5d9b23c475f602f
SHA1 hash:
7cf9a2a412aa3bb5f78f19ba419551faad4758f2
SH256 hash:
fb171c49f3c652257fab7af82f325b56ffd2b90e3fdf95302fa0ae2e279c251b
MD5 hash:
2ec3d79fd342730fcb1f9d1849f50744
SHA1 hash:
519a0d6eae1e15141ed511d2d93a234e751426a6
Detections:
INDICATOR_EXE_Packed_SmartAssembly
SH256 hash:
1364a55bec4c70dff327547de757624408f58c74c893f52c2d488bc9c76f94d9
MD5 hash:
7a9cfe939742cc345a8c6d8f6201fa61
SHA1 hash:
c4dd41a33c0d2c6cce5c38bf3013a61eb1ac1abf
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
3c39640de0087bff9c169940bb6a99d60db1299dda4c96d4f63055de437864ba
MD5 hash:
e3ae2634b39f83c9218977b5f3539e58
SHA1 hash:
c783925230aea279fdf51be2bf553b750e83a593
Detections:
win_remcos_w0 win_remcos_auto Remcos malware_windows_remcos_rat win_remcos_rat_unpacked INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments