MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0f43b627353f91afa5e4a9c5eea655f5375e497933a6e37c3c0f8a5a29a2889. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: b0f43b627353f91afa5e4a9c5eea655f5375e497933a6e37c3c0f8a5a29a2889
SHA3-384 hash: 0ee199ce88459fcad135f8bf3fb3da346d905976ada62c49068fda1c3e8c8ee2b93fc0c3c1c6ec469a3fd75a08b8bf96
SHA1 hash: b9005e605fac55df470cde2b1ab0a1441fb1527f
MD5 hash: ce5d381161004cbbd80eaf1f37089cb2
humanhash: thirteen-yankee-orange-sink
File name:ce5d381161004cbbd80eaf1f37089cb2
Download: download sample
Signature RemcosRAT
File size:766'464 bytes
First seen:2021-09-03 02:02:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ee4f103a4bbb8328057c2211d7594d0a (2 x RemcosRAT)
ssdeep 12288:uEkuPF5S618CS6qkVdQOHvDc9aGKqa/yAXKQcj2SKI:uE/HS61uyswGKqXAzcR
Threatray 560 similar samples on MalwareBazaar
TLSH T151F47D22B640497AE0AB5AF44C0E72A9DC2ABD50367858E94BF07D0C5F7E3937726533
dhash icon daebe9240804a462 (7 x RemcosRAT, 1 x Formbook, 1 x AveMariaRAT)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
tud.exe
Verdict:
Suspicious activity
Analysis date:
2021-09-03 01:48:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Deleting a recently created file
Launching a process
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 476900 Sample: aWJOIbEUw4 Startdate: 03/09/2021 Architecture: WINDOWS Score: 100 40 twistednerd.dvrlists.com 2->40 50 Multi AV Scanner detection for domain / URL 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 5 other signatures 2->56 9 aWJOIbEUw4.exe 1 22 2->9         started        14 Uogsnyk.exe 2->14         started        16 Uogsnyk.exe 2->16         started        signatures3 process4 dnsIp5 44 sn-files.fe.1drv.com 9->44 46 onedrive.live.com 9->46 48 nt5jww.sn.files.1drv.com 9->48 38 C:\Users\Public\Libraries\...\Uogsnyk.exe, PE32 9->38 dropped 66 Writes to foreign memory regions 9->66 68 Creates a thread in another existing process (thread injection) 9->68 70 Injects a PE file into a foreign processes 9->70 18 mshta.exe 2 9->18         started        22 cmd.exe 1 9->22         started        24 cmd.exe 1 9->24         started        72 Multi AV Scanner detection for dropped file 14->72 74 Machine Learning detection for dropped file 14->74 file6 signatures7 process8 dnsIp9 42 twistednerd.dvrlists.com 62.102.148.152, 8618 TEKNIKBYRANSE Sweden 18->42 58 Contains functionality to steal Chrome passwords or cookies 18->58 60 Contains functionality to inject code into remote processes 18->60 62 Contains functionality to steal Firefox passwords or cookies 18->62 64 Delayed program exit found 18->64 26 reg.exe 1 22->26         started        28 conhost.exe 22->28         started        30 cmd.exe 1 24->30         started        32 conhost.exe 24->32         started        signatures10 process11 process12 34 conhost.exe 26->34         started        36 conhost.exe 30->36         started       
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-09-01 17:41:40 UTC
AV detection:
25 of 43 (58.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:augusta persistence rat trojan
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
twistednerd.dvrlists.com:8618
Unpacked files
SH256 hash:
1f5c2520d541b41af22ee4917c07e110a14b1509097459886dcf6d0290cfc869
MD5 hash:
f5a98486daa07622d3091142a9e42d5e
SHA1 hash:
44b6b9d1b0009f9c1b3e9662789030873b9908d7
SH256 hash:
4e1202f3e7e04b0b3ca1df164bf5381f24063c142317e774d4e5d88b2b3ac744
MD5 hash:
aa23dee2c34813d67fe9c67ec784782a
SHA1 hash:
10b2e7af7cb9d6f852e6d607875a8c9613538930
SH256 hash:
b0f43b627353f91afa5e4a9c5eea655f5375e497933a6e37c3c0f8a5a29a2889
MD5 hash:
ce5d381161004cbbd80eaf1f37089cb2
SHA1 hash:
b9005e605fac55df470cde2b1ab0a1441fb1527f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe b0f43b627353f91afa5e4a9c5eea655f5375e497933a6e37c3c0f8a5a29a2889

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-03 02:02:11 UTC

url : hxxp://198.23.251.110/tud.exe