MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b6bcdbd5822720d72a949b018443c758725389d96cffb16a146830c567c302d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 8 File information Comments

SHA256 hash: b6bcdbd5822720d72a949b018443c758725389d96cffb16a146830c567c302d2
SHA3-384 hash: a8414b6b53f131ac7c5bbafbe9c5d69607ff1c1e9b5a7c3343734e82c642059cc0bff4ada4e4fc0fe97cc9dd9c31bdd6
SHA1 hash: d05de864d273343c4204e9608330a1867a24fa95
MD5 hash: 493a5c9a1469cef994d69f1dd102e0da
humanhash: green-london-echo-yellow
File name:493a5c9a1469cef994d69f1dd102e0da.exe
Download: download sample
Signature RemcosRAT
File size:8'034'304 bytes
First seen:2024-12-06 08:24:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6f606f06ec09214ff316970dd345d826 (1 x RemcosRAT)
ssdeep 98304:w3x3FJ58yNYqDP06ZKkcCOQhrgMSVV+uKIqKpFfAlGhrQ:w31H5nqIKCD9uKIqK73B
TLSH T11F866B973582B26FC84E01368D48F26651FE6E712E2200F7BBF1771919325834E6AD6F
TrID 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.5% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon 3c1f5bac33339dfc (1 x RemcosRAT)
Reporter abuse_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
412
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
2024-12-05_493a5c9a1469cef994d69f1dd102e0da_avoslocker_luca-stealer_rhadamanthys
Verdict:
Malicious activity
Analysis date:
2024-12-05 14:54:31 UTC
Tags:
rat remcos remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
shellcode remcos extens keylog
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Сreating synchronization primitives
Setting a keyboard event handler
Connecting to a non-recommended domain
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Creating a file
Enabling the 'hidden' option for recently created files
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context explorer fingerprint keylogger lolbin microsoft_visual_cc
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Detected unpacking (creates a PE file in dynamic memory)
Drops large PE files
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2024-12-05 09:47:27 UTC
File Type:
PE (Exe)
Extracted files:
62
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:dic discovery persistence rat
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Adds Run key to start application
Remcos
Remcos family
Malware Config
C2 Extraction:
5.34.178.128:8090
Unpacked files
SH256 hash:
8368c3e8c17fb365b438818808dee4c7a74769a3287944e80ad8a4e9afd4216f
MD5 hash:
cec523dbb312c6f3fcd41ec864b4f51c
SHA1 hash:
e42e993fc86552e5cada0640e5abbffc08d2f037
Detections:
Remcos win_remcos_auto win_remcos_w0 malware_windows_remcos_rat INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM win_remcos_rat_unpacked
SH256 hash:
b6bcdbd5822720d72a949b018443c758725389d96cffb16a146830c567c302d2
MD5 hash:
493a5c9a1469cef994d69f1dd102e0da
SHA1 hash:
d05de864d273343c4204e9608330a1867a24fa95
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoFreeUnusedLibraries
ole32.dll::CreateStreamOnHGlobal
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipDeleteGraphics
gdiplus.dll::GdipAlloc
gdiplus.dll::GdipCreateFromHDC
MULTIMEDIA_APICan Play MultimediaWINMM.dll::PlaySoundW
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetVolumeInformationW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
SHLWAPI.dll::PathRemoveFileSpecW
KERNEL32.dll::GetWindowsDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::CreateMenu
ole32.dll::OleCreateMenuDescriptor
USER32.dll::EmptyClipboard
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW

Comments