MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3b8758d2b0c4bdb9568a41eb6190e648d0f15f186e5d6294c2361c13ce6ef03. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: a3b8758d2b0c4bdb9568a41eb6190e648d0f15f186e5d6294c2361c13ce6ef03
SHA3-384 hash: 1a5a84e38b02d5e99bb15e9b4507b9c6564a381ee58849cd27c6c875e42c0f58db8ae7f28a46ff0c939645dd22ae1409
SHA1 hash: 9031f9e3bd5322401e1ad952ca4855224e414c77
MD5 hash: 01db651e342f6ad0f21a21bde1c6e4be
humanhash: glucose-mango-wyoming-wolfram
File name:QBPOS Purchase.doc.001
Download: download sample
Signature RemcosRAT
File size:396'570 bytes
First seen:2023-09-10 06:47:12 UTC
Last seen:2023-09-10 06:47:33 UTC
File type: rar
MIME type:application/x-rar
ssdeep 12288:0sPKX/tG+zAEDCadZUa2+QTAPt4l64dhxO:AnznvUbTstkjdhxO
TLSH T1CA84234822B09CEE22EA4151D845441AE8E76C36224E69D95478530FA3DC3C6FFDF6FB
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:001 rar RemcosRAT


Avatar
cocaman
Malicious email (T1566.001)
From: "BKK <order3@super-duper.biz>" (likely spoofed)
Received: "from super-duper.biz (unknown [185.216.71.115]) "
Date: "4 Sep 2023 10:26:06 -0700"
Subject: "Purchase Order 230930075 from Super Duper BKK1, Account# L001-100049680"
Attachment: "QBPOS Purchase.doc.001"

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
CZ CZ
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:QBPOS Purchase.doc.exe
File size:1'125'376 bytes
SHA256 hash: a94dc2ec5ba36249dcf25e76a013cad2ff628acc349e5478705c0cb92bc6050d
MD5 hash: 5a5e01532d13cc779f1ad7bbc89b843d
MIME type:application/x-dosexec
Signature RemcosRAT
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control keylogger lolbin masquerade modiloader remcos replace
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-09-04 00:02:33 UTC
File Type:
Binary (Archive)
Extracted files:
43
AV detection:
21 of 38 (55.26%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:great persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
Greatzillart.ydns.eu:1960
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

rar a3b8758d2b0c4bdb9568a41eb6190e648d0f15f186e5d6294c2361c13ce6ef03

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
RemcosRAT

Comments