MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5e3a5a5abe4d46785deadb6630c0df664155bc61400ccec33881adbee9604d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: a5e3a5a5abe4d46785deadb6630c0df664155bc61400ccec33881adbee9604d7
SHA3-384 hash: 409b7430ece95bcd67ee6c549b100139c358b9c944b2a0272894cd6765b9ad9e1305de6b934453cc0a189d2ad74e581e
SHA1 hash: a882f45f6bacb2189e32d2b198fdc88bbe4af090
MD5 hash: 74051e5dea362558c426759eb97b55df
humanhash: robert-steak-table-speaker
File name:fatura_Bayi Abone Numarası 000000012100000735.exe
Download: download sample
Signature RemcosRAT
File size:929'280 bytes
First seen:2022-11-01 10:49:42 UTC
Last seen:2022-11-02 07:53:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 24576:2uJ8s75wPPbjEJl4uWubwwIHqIwOZ+wP:2uas2EP4uLzOZ+e
Threatray 2'445 similar samples on MalwareBazaar
TLSH T1C8152362763B98A2F9780BFD8262429123F0FC82FD11DE5E194571CE1AB278AD754733
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0a1717070b132b17 (14 x AgentTesla, 3 x RemcosRAT, 2 x SnakeKeylogger)
Reporter spatronn2
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
330
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fatura_Bayi Abone Numarası 000000012100000735.exe
Verdict:
No threats detected
Analysis date:
2022-11-01 10:50:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
Launching the default Windows debugger (dwwin.exe)
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 735106 Sample: fatura_Bayi Abone Numaras#U... Startdate: 01/11/2022 Architecture: WINDOWS Score: 100 47 Multi AV Scanner detection for domain / URL 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 8 other signatures 2->53 8 fatura_Bayi Abone Numaras#U0131 000000012100000735.exe 3 2->8         started        process3 file4 31 fatura_Bayi Abone ...12100000735.exe.log, ASCII 8->31 dropped 55 Injects a PE file into a foreign processes 8->55 12 fatura_Bayi Abone Numaras#U0131 000000012100000735.exe 2 17 8->12         started        signatures5 process6 dnsIp7 37 eaidali101.ddns.net 85.209.134.59, 49696, 49697, 6060 CMCSUS Germany 12->37 39 geoplugin.net 178.237.33.50, 49698, 80 ATOM86-ASATOM86NL Netherlands 12->39 33 C:\ProgramData\remcos\logs.dat, data 12->33 dropped 57 Maps a DLL or memory area into another process 12->57 59 Installs a global keyboard hook 12->59 17 fatura_Bayi Abone Numaras#U0131 000000012100000735.exe 1 12->17         started        20 fatura_Bayi Abone Numaras#U0131 000000012100000735.exe 1 12->20         started        22 fatura_Bayi Abone Numaras#U0131 000000012100000735.exe 1 12->22         started        24 22 other processes 12->24 file8 signatures9 process10 signatures11 41 Tries to steal Instant Messenger accounts or passwords 17->41 43 Tries to steal Mail credentials (via file / registry access) 17->43 45 Tries to harvest and steal browser information (history, passwords, etc) 24->45 26 WerFault.exe 24->26         started        29 WerFault.exe 23 11 24->29         started        process12 dnsIp13 35 192.168.2.1 unknown unknown 26->35
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-11-01 09:43:03 UTC
File Type:
PE (.Net Exe)
Extracted files:
24
AV detection:
24 of 41 (58.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
15d73a776fe344c81d89f8c1403a88694e798a4698997b7e71ff8cd285043e5e
MD5 hash:
30f4d7c4a68786ee7add65357696b171
SHA1 hash:
f1dc5ea4551456140bda5f1be92ea156260cab2f
SH256 hash:
ddf5d7a3448d13d4630f313d61ec2b805c3de5e86b284602028021839bb10edf
MD5 hash:
9b05349e0b6c981734cdced4f6af672c
SHA1 hash:
8675dfd69bd312a7ea4dbad11d7caaee47f44f5d
SH256 hash:
777c1175f42f3f77cc5c16ecd4b9a316b609fb61bb2ee5570a421641b7d44c3a
MD5 hash:
6abd97a3144b5f2bfdbc43458e865ec8
SHA1 hash:
5d964c7666b5449b7aefce101ba8310d9599341d
SH256 hash:
cfc16a2dbb933b1b85807d48966e9301b9fc34f4c44e7357713ca88b54bf4ab4
MD5 hash:
aabd0bdc81026ade6c57383f21d5c227
SHA1 hash:
4b26936bb8c03be6d7963184215a5ab594ecb765
SH256 hash:
a5e3a5a5abe4d46785deadb6630c0df664155bc61400ccec33881adbee9604d7
MD5 hash:
74051e5dea362558c426759eb97b55df
SHA1 hash:
a882f45f6bacb2189e32d2b198fdc88bbe4af090
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments