MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a4e00539efa24fa0dc30fef0d933d48fed1bcb90edfd1c6f639c53646a18cd3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 6
| SHA256 hash: | a4e00539efa24fa0dc30fef0d933d48fed1bcb90edfd1c6f639c53646a18cd3d |
|---|---|
| SHA3-384 hash: | d553ec97d22abb406f3e534828020502537a31e6f417309e9c8bdafc141190cb5ae0bc0e2499e57d9468367bf95dcd56 |
| SHA1 hash: | 47a57a56163dfee83cf1738ca6b4ff6d1dfe0236 |
| MD5 hash: | 879b8457054ae721d58b079add6e7b38 |
| humanhash: | ten-georgia-solar-florida |
| File name: | UUCENQAV1220216030,pdf.001 |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 413'049 bytes |
| First seen: | 2021-12-07 08:47:48 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:pVMPbFaFtk8Cfn9r3RI7ksuC7X7lUpvXdOhEl0l474c2jdEm8I2di5zQfLQ3maBD:30RaoVuXRuIQY+2JEm8I2Jf0374Ud3 |
| TLSH | T123942356B003608999FA1708397D98DBB95E2D7883037140FBBE715DEF66816386FB2C |
| Reporter | |
| Tags: | 001 rar RemcosRAT |
cocaman
Malicious email (T1566.001)From: ""Nebuchadnezzar Manalo" <info@ropellla.com>" (likely spoofed)
Received: "from box1.ropellla.com (box1.ropellla.com [212.193.30.19]) "
Date: "Mon, 06 Dec 2021 14:01:34 +0800"
Subject: "UUC/ENQ/AV/12/2021/6030"
Attachment: "UUCENQAV1220216030,pdf.001"
Intelligence
File Origin
# of uploads :
1
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
anti-debug anti-vm greyware keylogger
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2021-12-06 17:30:30 UTC
File Type:
Binary (Archive)
Extracted files:
118
AV detection:
17 of 27 (62.96%)
Threat level:
5/5
Detection(s):
Malicious file
Result
Malware family:
n/a
Score:
1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.50
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
RemcosRAT
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.