MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b05eb1ace6dd219a6e5ea23d25ea88bbd672ad379ac4dcaa935acbfdece37c0b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b05eb1ace6dd219a6e5ea23d25ea88bbd672ad379ac4dcaa935acbfdece37c0b
SHA3-384 hash: 487f44c22daf44a14249eb732b355692a2d7fe142e2018add7a33d0196e7c502919589584e7c19716705af5916a6c2e8
SHA1 hash: c4b617e010c62228d8f79af2c8fb729a95bf341a
MD5 hash: 3ce5e8e59373de4f4ac0a98db283624f
humanhash: kitten-georgia-black-may
File name:vis.bin
Download: download sample
Signature RemcosRAT
File size:849'920 bytes
First seen:2020-08-04 12:23:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:JJ0nM2/H2guFRmEfvnD5xkYgRbPPMtt/C//Lw4fwuYpHZ25h:XEM2/H2g8lfvtx167PP//L9wxHZ2j
Threatray 819 similar samples on MalwareBazaar
TLSH 62051A3239939448C93987B50068EDC273767A863F55CB2EB19B630C9E0349F7B2D6D9
Reporter JAMESWT_WT
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Uses dynamic DNS services
Yara detected MSIL Crypter
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 256960 Sample: vis.bin Startdate: 04/08/2020 Architecture: WINDOWS Score: 100 48 vision2020.ddns.net 2->48 52 Malicious sample detected (through community Yara rule) 2->52 54 Detected Remcos RAT 2->54 56 Yara detected MSIL Crypter 2->56 58 4 other signatures 2->58 9 vis.exe 4 2->9         started        13 mauverlite.exe 3 2->13         started        15 mauverlite.exe 2->15         started        signatures3 process4 file5 44 C:\Users\user\AppData\Local\...\vis.exe.log, ASCII 9->44 dropped 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->68 17 cmd.exe 1 9->17         started        19 cmd.exe 2 9->19         started        46 C:\Users\user\AppData\...\mauverlite.lnk, MS 13->46 dropped 22 mauverlite.exe 13->22         started        signatures6 process7 file8 24 mauverlite.exe 5 17->24         started        28 conhost.exe 17->28         started        38 C:\Users\user\AppData\...\mauverlite.exe, PE32 19->38 dropped 30 conhost.exe 19->30         started        32 WerFault.exe 20 1 22->32         started        process9 file10 42 C:\Users\user\AppData\...\mauverlite.exe.log, ASCII 24->42 dropped 60 Machine Learning detection for dropped file 24->60 62 Contains functionality to steal Chrome passwords or cookies 24->62 64 Contains functionality to capture and log keystrokes 24->64 66 3 other signatures 24->66 34 mauverlite.exe 2 3 24->34         started        signatures11 process12 dnsIp13 50 vision2020.ddns.net 34->50 40 C:\Users\user\AppData\Roaming\...\logs.dat, ASCII 34->40 dropped file14
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2020-01-09 18:50:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
spyware rat family:remcos
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Loads dropped DLL
Drops startup file
Reads user/profile data of web browsers
Executes dropped EXE
Remcos
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe b05eb1ace6dd219a6e5ea23d25ea88bbd672ad379ac4dcaa935acbfdece37c0b

(this sample)

  
Delivery method
Distributed via web download

Comments