MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b938ff358f891462489b2dc54b8d4cb2486eeebae2fa2dcd5a2e5c0de679b426. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: b938ff358f891462489b2dc54b8d4cb2486eeebae2fa2dcd5a2e5c0de679b426
SHA3-384 hash: b096ac4fc868d2b74f516c6635c3fc0092ce213e2bb09a31cc6990e1cba42e3a66bc55aa099a186ced90a3e21ace95f9
SHA1 hash: 5e40457e41dfc0aaa2bdf725f4f87b0d82ae6f94
MD5 hash: 9963a82f9d9f9a95de0ed2976f93318e
humanhash: eight-alaska-mike-cola
File name:9963a82f9d9f9a95de0ed2976f93318e.exe
Download: download sample
Signature RemcosRAT
File size:751'616 bytes
First seen:2023-03-10 07:36:50 UTC
Last seen:2023-03-10 09:29:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:SFlLKHFjcsqUWDPaadszMbFSs7Wb1wfQKJ40X6A4Xh/lB7f+/fLCliy9KLbUW6UW:IDPaadszGlib1jG40Xwx/lwnmlL9Ye
Threatray 15 similar samples on MalwareBazaar
TLSH T12CF4AE856312A87BCB5769BFF0511E28237CA91DEEFCD6885845309B08DDFB548C29CB
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 68e8aab3b3e04468 (12 x AgentTesla, 5 x Loki, 3 x SnakeKeylogger)
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
79.134.225.119:3035

Intelligence


File Origin
# of uploads :
2
# of downloads :
245
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9963a82f9d9f9a95de0ed2976f93318e.exe
Verdict:
Malicious activity
Analysis date:
2023-03-10 07:42:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Launching cmd.exe command interpreter
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Launching a process
Changing a file
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the User Account Control
Verdict:
Malicious
Threat level:
  10/10
Confidence:
60%
Tags:
comodo formbook packed remcos
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates an autostart registry key pointing to binary in C:\Windows
Detected Remcos RAT
Disables UAC (registry)
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 823834 Sample: w2tqpR5e2N.exe Startdate: 10/03/2023 Architecture: WINDOWS Score: 100 79 Snort IDS alert for network traffic 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 Multi AV Scanner detection for dropped file 2->83 85 8 other signatures 2->85 11 w2tqpR5e2N.exe 3 2->11         started        15 Windows Start-Up Audio.exe 2 2->15         started        process3 file4 65 C:\Users\user\AppData\...\w2tqpR5e2N.exe.log, ASCII 11->65 dropped 101 Contains functionality to detect virtual machines (IN, VMware) 11->101 103 Contains functionality to steal Chrome passwords or cookies 11->103 105 Contains functionality to capture and log keystrokes 11->105 109 2 other signatures 11->109 17 w2tqpR5e2N.exe 1 5 11->17         started        107 Drops executables to the windows directory (C:\Windows) and starts them 15->107 21 Windows Start-Up Audio.exe 2 15->21         started        24 Windows Start-Up Audio.exe 15->24         started        signatures5 process6 dnsIp7 61 C:\Windows\...\Windows Start-Up Audio.exe, PE32 17->61 dropped 63 Windows Start-Up A...exe:Zone.Identifier, ASCII 17->63 dropped 87 Creates an autostart registry key pointing to binary in C:\Windows 17->87 26 cmd.exe 1 17->26         started        29 cmd.exe 1 17->29         started        69 ytuna1709.duckdns.org 79.134.225.119, 3035, 49698 FINK-TELECOM-SERVICESCH Switzerland 21->69 89 Installs a global keyboard hook 21->89 31 cmd.exe 1 21->31         started        file8 signatures9 process10 signatures11 95 Uses ping.exe to sleep 26->95 33 Windows Start-Up Audio.exe 3 26->33         started        35 PING.EXE 1 26->35         started        38 conhost.exe 26->38         started        97 Uses cmd line tools excessively to alter registry or file data 29->97 99 Uses ping.exe to check the status of other devices and networks 29->99 40 reg.exe 1 29->40         started        43 conhost.exe 29->43         started        45 conhost.exe 31->45         started        47 reg.exe 1 31->47         started        process12 dnsIp13 49 Windows Start-Up Audio.exe 2 1 33->49         started        67 127.0.0.1 unknown unknown 35->67 93 Disables UAC (registry) 40->93 signatures14 process15 signatures16 71 Detected Remcos RAT 49->71 73 Writes to foreign memory regions 49->73 75 Allocates memory in foreign processes 49->75 77 Injects a PE file into a foreign processes 49->77 52 cmd.exe 49->52         started        55 iexplore.exe 49->55         started        process17 signatures18 91 Uses cmd line tools excessively to alter registry or file data 52->91 57 conhost.exe 52->57         started        59 reg.exe 1 52->59         started        process19
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2023-03-10 06:27:59 UTC
AV detection:
16 of 22 (72.73%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:update brand:microsoft evasion persistence phishing rat trojan
Behaviour
Enumerates system info in registry
Modifies registry class
Modifies registry key
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Detected potential entity reuse from brand microsoft.
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Remcos
UAC bypass
Malware Config
C2 Extraction:
ytuna1709.duckdns.org:3035
Unpacked files
SH256 hash:
8f11b507eb78906706818690937f9e87c79c62ff41381e1b6bc4eebca9b1bd42
MD5 hash:
b65f48926aefc7f069f68166cacfce60
SHA1 hash:
f1b176276285aa4b67929d1483461b1cbaa12d6e
SH256 hash:
19af4bd362626268a49b289adcb937015a40de31baf3a0ad574ee942e88ab1f7
MD5 hash:
92a67ceceb9653bb5a8d10999ca01f53
SHA1 hash:
cb0ee3e4f078320e62f6fe52e246bc64bab4743c
Detections:
Remcos win_remcos_auto win_remcos_g0
SH256 hash:
d06df7395d561e198f9b7c5481567116ff2e4c2e84437c018d2a2c8ea6c4ca37
MD5 hash:
0fb6061f7d37424fb9e6d0e76b019c19
SHA1 hash:
98a64bf7b459f032d6ec5793003bf61b5ae1dd74
SH256 hash:
a06c934adf60ef92ea51850df3a4eff8e4a3836859146d1885084768bbf4fb83
MD5 hash:
f4a62bfc03e419d5de3c71145bdf02af
SHA1 hash:
5c509678eeebb39206ff3daaf593f9a2b1ef0347
SH256 hash:
c234684a33231d86ca3a0c6459d4fc982bfd2516807b0022d9094868d2111719
MD5 hash:
33846e3d38c36db71b091f1d26d97491
SHA1 hash:
a92e54e4016e792bd11828e92c66684f69309ea2
SH256 hash:
b938ff358f891462489b2dc54b8d4cb2486eeebae2fa2dcd5a2e5c0de679b426
MD5 hash:
9963a82f9d9f9a95de0ed2976f93318e
SHA1 hash:
5e40457e41dfc0aaa2bdf725f4f87b0d82ae6f94
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe b938ff358f891462489b2dc54b8d4cb2486eeebae2fa2dcd5a2e5c0de679b426

(this sample)

  
Delivery method
Distributed via web download

Comments