MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a9df1a3b22a408f630ea9e57fdcce2b8483cb5eac3414b5c172b51ec98178490. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 28 File information Comments

SHA256 hash: a9df1a3b22a408f630ea9e57fdcce2b8483cb5eac3414b5c172b51ec98178490
SHA3-384 hash: a5ed1be586f58397b21dbda87160b4b360f8f08103ddcd11b047d9f827f0f77c847d9ad808b70c82e306d21035f7cd96
SHA1 hash: c6b90d7469836e55207608fe46ca201a83d3aa47
MD5 hash: 3c799830186bb6a7d63083ba711c551d
humanhash: dakota-leopard-sad-bravo
File name:a9df1a3b22a408f630ea9e57fdcce2b8483cb5eac3414b5c172b51ec98178490
Download: download sample
Signature RemcosRAT
File size:1'022'464 bytes
First seen:2024-04-08 12:26:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:ukH6ayww0yNDAooku24inFf7DCwHVr1cErwHJ5Z2r4cdhu6YgX7ZL2OvIpdbMaGv:r6ajKqo+2rnF9SHYkGTX9KOAr/xAP
Threatray 3'834 similar samples on MalwareBazaar
TLSH T1D62522A5229D5726DA5A13B8420FC23207B24CD35825C3A94EDB6CCF76B5FD0813AF5B
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Reporter adrian__luca
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
305
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
a9df1a3b22a408f630ea9e57fdcce2b8483cb5eac3414b5c172b51ec98178490
Verdict:
Malicious activity
Analysis date:
2024-04-08 12:25:29 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Connection attempt
Setting a keyboard event handler
Moving a file to the Program Files subdirectory
Replacing files
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1422270 Sample: Ei6JHlax9A.exe Startdate: 08/04/2024 Architecture: WINDOWS Score: 100 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 48 10 other signatures 2->48 7 eRiJQqC.exe 5 2->7         started        10 Ei6JHlax9A.exe 7 2->10         started        process3 file4 50 Multi AV Scanner detection for dropped file 7->50 52 Contains functionality to bypass UAC (CMSTPLUA) 7->52 54 Contains functionalty to change the wallpaper 7->54 62 5 other signatures 7->62 13 eRiJQqC.exe 7->13         started        16 schtasks.exe 1 7->16         started        36 C:\Users\user\AppData\Roaming\eRiJQqC.exe, PE32 10->36 dropped 38 C:\Users\user\AppData\Local\Temp\tmp869.tmp, XML 10->38 dropped 56 Uses schtasks.exe or at.exe to add and modify task schedules 10->56 58 Adds a directory exclusion to Windows Defender 10->58 60 Injects a PE file into a foreign processes 10->60 18 Ei6JHlax9A.exe 3 2 10->18         started        22 powershell.exe 23 10->22         started        24 schtasks.exe 1 10->24         started        signatures5 process6 dnsIp7 26 conhost.exe 16->26         started        40 37.120.235.114, 2269 SECURE-DATA-ASRO Romania 18->40 34 C:\ProgramData\remcos\logs.dat, data 18->34 dropped 64 Detected Remcos RAT 18->64 66 Installs a global keyboard hook 18->66 28 WmiPrvSE.exe 22->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        file8 signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-03-30 13:39:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:host rat
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Remcos
Malware Config
C2 Extraction:
37.120.235.114:2269
Unpacked files
SH256 hash:
934493ffcf84233432ef4b4bacc7e1e282acd7366505bc3050f619e6e3767f4c
MD5 hash:
6458eafa0681114ad4f98d4014223d76
SHA1 hash:
a8f40dd46897496cb5c286889748760f62fd79dd
SH256 hash:
e11a70300fa9586e6af6e45f0def9ac5e3aa39e4be78bfcaac6692c6e75409be
MD5 hash:
0c5a55983a9fc4174987da87c2b58ee1
SHA1 hash:
a03a2963271a6f888664911660cffad64ad1eb11
Detections:
Remcos win_remcos_w0 win_remcos_auto malware_windows_remcos_rat INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
SH256 hash:
85265c0f996e1f3c7f8a5eba105928a9505e57a9de5b1ec554a4e6b6403559fc
MD5 hash:
82d2f9c3baf9b3da518e3640644a2825
SHA1 hash:
8c8464ae71dcf785d44f58c61c25690c2988ba46
SH256 hash:
7a052f1b312514eb4953409ec397f1a8669ae04fcddf9c17a45630d9b99342d7
MD5 hash:
4aa46da608a5ed2f1f931d6905993570
SHA1 hash:
3cd2d999793022b5721221a3259ec56b921a431a
SH256 hash:
a9df1a3b22a408f630ea9e57fdcce2b8483cb5eac3414b5c172b51ec98178490
MD5 hash:
3c799830186bb6a7d63083ba711c551d
SHA1 hash:
c6b90d7469836e55207608fe46ca201a83d3aa47
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:QbotStuff
Author:anonymous
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:TeslaCryptPackedMalware
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.
Rule name:win_remcos_w0
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:yarahub_win_remcos_rat_unpacked_aug_2023
Author:Matthew @ Embee_Research
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments