MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 baa1926f8f9eb46243f4591d418581fc422268a40aec9a83fccf7e3ee2f913af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: baa1926f8f9eb46243f4591d418581fc422268a40aec9a83fccf7e3ee2f913af
SHA3-384 hash: 1076874a9d97029a9590c37e05b978da4cca17afbad125b9c30724f7ac8c3bb56d7eea45d5c8d4be657250393968279c
SHA1 hash: 5a6001e488ee7fb0ec19e5727871c7a1d476457d
MD5 hash: 9ca296392ffda3a2168b2c8e38423f88
humanhash: carolina-florida-georgia-steak
File name:9ca296392ffda3a2168b2c8e38423f88.exe
Download: download sample
Signature RemcosRAT
File size:1'311'761 bytes
First seen:2023-03-27 08:50:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (389 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 24576:lTbBv5rUqDGbB22Y7+QE96qZaeUTHc8SqAOgRF65:PBX0YZD40kVqK65
Threatray 2'197 similar samples on MalwareBazaar
TLSH T156551202BFD159B2D1A32A320A76AB11557D3E201F798FCF63E03A2CDA711D1D634BA5
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon aa55d4d4d4713196 (1 x RemcosRAT, 1 x EternityStealer)
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
104.254.90.203:42940

Intelligence


File Origin
# of uploads :
1
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
9ca296392ffda3a2168b2c8e38423f88.exe
Verdict:
Malicious activity
Analysis date:
2023-03-27 08:50:50 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Launching a process
Sending a custom TCP request
Creating a process from a recently created file
Creating a file
Creating a process with a hidden window
DNS request
Sending an HTTP GET request
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm anti-vm autoit greyware keylogger overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Snort IDS alert for network traffic
Starts an encoded Visual Basic Script (VBE)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM autoit script
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 835431 Sample: hm0qTfAbNM.exe Startdate: 27/03/2023 Architecture: WINDOWS Score: 100 97 Snort IDS alert for network traffic 2->97 99 Malicious sample detected (through community Yara rule) 2->99 101 Multi AV Scanner detection for submitted file 2->101 103 7 other signatures 2->103 9 hm0qTfAbNM.exe 83 2->9         started        13 exrthati.pif 2->13         started        15 exrthati.pif 2->15         started        17 exrthati.pif 2->17         started        process3 file4 89 C:\Users\user\AppData\Local\...\exrthati.pif, PE32 9->89 dropped 119 Drops PE files with a suspicious file extension 9->119 121 Starts an encoded Visual Basic Script (VBE) 9->121 19 wscript.exe 1 9->19         started        123 Writes to foreign memory regions 13->123 125 Allocates memory in foreign processes 13->125 127 Adds a directory exclusion to Windows Defender 13->127 21 powershell.exe 13->21         started        23 powershell.exe 13->23         started        25 powershell.exe 13->25         started        31 4 other processes 13->31 129 Injects a PE file into a foreign processes 15->129 27 powershell.exe 15->27         started        29 powershell.exe 15->29         started        33 5 other processes 15->33 35 7 other processes 17->35 signatures5 process6 process7 37 exrthati.pif 1 4 19->37         started        41 2 other processes 21->41 43 2 other processes 23->43 45 2 other processes 25->45 47 2 other processes 27->47 49 2 other processes 29->49 51 5 other processes 31->51 53 7 other processes 33->53 55 11 other processes 35->55 file8 87 C:\Users\user\AppData\Local\...\RegSvcs.exe, PE32 37->87 dropped 111 Multi AV Scanner detection for dropped file 37->111 113 Writes to foreign memory regions 37->113 115 Allocates memory in foreign processes 37->115 117 2 other signatures 37->117 57 RegSvcs.exe 37->57         started        61 powershell.exe 5 37->61         started        63 powershell.exe 5 37->63         started        65 4 other processes 37->65 signatures9 process10 dnsIp11 91 104.254.90.203, 42940, 49685, 49686 AMANAHA-NEWCA Canada 57->91 93 geoplugin.net 178.237.33.50, 49688, 80 ATOM86-ASATOM86NL Netherlands 57->93 131 Tries to harvest and steal browser information (history, passwords, etc) 57->131 133 Maps a DLL or memory area into another process 57->133 67 RegSvcs.exe 57->67         started        70 RegSvcs.exe 57->70         started        72 RegSvcs.exe 57->72         started        78 19 other processes 57->78 81 2 other processes 61->81 83 2 other processes 63->83 74 conhost.exe 65->74         started        76 conhost.exe 65->76         started        85 5 other processes 65->85 signatures12 process13 dnsIp14 105 Tries to steal Instant Messenger accounts or passwords 67->105 107 Tries to steal Mail credentials (via file / registry access) 67->107 95 192.168.2.1 unknown unknown 78->95 109 Tries to harvest and steal browser information (history, passwords, etc) 78->109 signatures15
Threat name:
Win32.Trojan.Casdet
Status:
Malicious
First seen:
2023-03-27 08:51:21 UTC
File Type:
PE (Exe)
Extracted files:
129
AV detection:
22 of 37 (59.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost collection persistence rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
104.254.90.203:42940
Unpacked files
SH256 hash:
6c42b00835199e569954dad63dd26218b9a6f15397277194a33fcbba64acfc71
MD5 hash:
44329270ca5eb1c1a4b6c29c321cc148
SHA1 hash:
0349ebe792ab2a9263f3f20dbfd2af95b6f43bcf
SH256 hash:
f856e17eed1ef2e77707d6306897db314a35dc67e4741a8f0832368b4252546d
MD5 hash:
396d2255f4539e553ac14818c86ed81a
SHA1 hash:
feffc4d4477533e454438ff07093935b8b7d9fb9
Detections:
Remcos
SH256 hash:
baa1926f8f9eb46243f4591d418581fc422268a40aec9a83fccf7e3ee2f913af
MD5 hash:
9ca296392ffda3a2168b2c8e38423f88
SHA1 hash:
5a6001e488ee7fb0ec19e5727871c7a1d476457d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe baa1926f8f9eb46243f4591d418581fc422268a40aec9a83fccf7e3ee2f913af

(this sample)

  
Delivery method
Distributed via web download

Comments