MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 aa6b85daebb36539886cdef016e0a425bed8fcff8d8e0726d43c9bee6460b074. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 4
| SHA256 hash: | aa6b85daebb36539886cdef016e0a425bed8fcff8d8e0726d43c9bee6460b074 |
|---|---|
| SHA3-384 hash: | 97c75a14855c7a457fd0af35b252518a8e25af6d40f13f64518d948d67763b378f640c1cdffbd38f4b543db5531269b5 |
| SHA1 hash: | 495a52b0c6973f3f441f5ceb4e34a2bf9637139f |
| MD5 hash: | 7bbe037ae8c6bda60a0e006395fac96a |
| humanhash: | nevada-rugby-five-high |
| File name: | ORDER9494.rar |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 265'039 bytes |
| First seen: | 2021-01-19 12:04:34 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:FlLD9lXZSLM7e/xwlCYigOfzshLRBN5X3Mk2e2k7no2bdNI:FlL3pSYC/6ygMzsZr3X3X77o2w |
| TLSH | 09442348AC39405C8E98ABE38F7601C22BAC783FD5B1C3D65894F9C6F02661D9F53D96 |
| Reporter | |
| Tags: | rar RAT RemcosRAT |
abuse_ch
Malspam distributing RemcosRAT:HELO: mail0.zi-company.com
Sending IP: 46.101.81.246
From: Azadeh Soleymani <Purchase@zi-company.com>
Subject: Re: Order_405911
Attachment: ORDER9494.rar (contains "ORDER#9494.exe")
RemcosRAT C2:
graceofgod1.ddns.net:3335
Intelligence
File Origin
# of uploads :
1
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.Azorult
Status:
Malicious
First seen:
2021-01-19 12:05:09 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.