MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3dbda9e244c0a7a63e9d669c838c9c290fd8bca5b1d35fa7add5a1950f578bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: a3dbda9e244c0a7a63e9d669c838c9c290fd8bca5b1d35fa7add5a1950f578bd
SHA3-384 hash: daa724bd92f9cb073e2e09dd96747f0d67b6bfd67b429e8d80496803905acbdfba4d529d86d65341ecaf46d1e97725a8
SHA1 hash: 6cb0743daf97a603c56662fc674a08582c47ddad
MD5 hash: 332c970b02124fbcb67ba1034e6fb4a9
humanhash: ceiling-solar-orange-mars
File name:RFQ_AP65425652_032421 dringend,pdf.exe
Download: download sample
Signature RemcosRAT
File size:757'760 bytes
First seen:2021-08-25 11:49:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 95ca75521f0d84796bcc75c19eb91d03 (4 x RemcosRAT, 1 x AveMariaRAT)
ssdeep 12288:HG0z7gLLMuRN/tMvdEAwM3nrkaoUfpACXDoVttivrlM5g1+yVt:HfzMzRxtMEqAP0iCXDvvrlc8xV
Threatray 477 similar samples on MalwareBazaar
TLSH T182F46C27EEEC4437C21724399E664EA2993A7EE835157B091BF0BD4ECE79301749A4C3
dhash icon f8e88ea482a8a888 (8 x RemcosRAT, 1 x AveMariaRAT, 1 x Formbook)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ_AP65425652_032421 dringend,pdf.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-25 11:51:19 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Deleting a recently created file
Launching a process
Connection attempt to an infection source
Creating a window
Sending a custom TCP request
Sending a UDP request
Unauthorized injection to a recently created process
DNS request
Connection attempt
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject threads in other processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2021-08-25 07:57:23 UTC
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:askalabi persistence rat trojan
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
thankyoulord4real.ddns.net:3030
Unpacked files
SH256 hash:
69b43f764e65daf8af6feec1aaceae822fc6705587d86a9eb490ebcd23c157eb
MD5 hash:
1ba17c2bbea2acdefc2e510c70936486
SHA1 hash:
3a753d99891da45886d265760db33d9e06d9c9e9
SH256 hash:
a3dbda9e244c0a7a63e9d669c838c9c290fd8bca5b1d35fa7add5a1950f578bd
MD5 hash:
332c970b02124fbcb67ba1034e6fb4a9
SHA1 hash:
6cb0743daf97a603c56662fc674a08582c47ddad
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments