MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb6ccf663f9bdaa2bcc49e79c1e94b06a1d575c3132767eb5b0116f93b881cbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: bb6ccf663f9bdaa2bcc49e79c1e94b06a1d575c3132767eb5b0116f93b881cbd
SHA3-384 hash: 5aa168e3f22a5f23ab4da7fd1dad5d4f5a0f254b15f9a265d7bfaf0d64bf73cd36cb01c0eb00e2f3f39faed9d17cf9b5
SHA1 hash: 89c814a3b9d8a4245d38e982f8ac11c759e6f0ff
MD5 hash: 7f0b24167aec9cd87a971026e2cf8866
humanhash: ohio-wyoming-lion-oregon
File name:Document.exe
Download: download sample
Signature RemcosRAT
File size:1'081'856 bytes
First seen:2021-11-04 10:23:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a909072c8ac1c865a094bf6cee9a4d60 (6 x RemcosRAT, 5 x Formbook)
ssdeep 12288:JmF8ukZ1BjH652L9a3ZV6ImC/KGaIEfrcSjzMYIO3pxhOtFuhe3CL+NdJydmf:JywJjf9QVOg6zZ3nheu8swJ
TLSH T1F8359F317AF3A473C022293C591B9235AD36BFF42D266E491FA06D0B5FB69053A79C43
File icon (PE):PE icon
dhash icon 697110152b2b1530 (9 x RemcosRAT, 6 x Formbook)
Reporter abuse_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Document.exe
Verdict:
Malicious activity
Analysis date:
2021-11-04 10:48:11 UTC
Tags:
trojan rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected Remcos RAT
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-11-04 10:24:05 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost persistence rat
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
rem1.camdvr.org:2404
rem16.hopto.org:2404
rem1666.hopto.org:2404
rem16.camdvr.org:2404
remmusic.freeddns.org:2404
sunwap1.ddns.net:2404
rem166.hopto.org:2404
Unpacked files
SH256 hash:
bb6ccf663f9bdaa2bcc49e79c1e94b06a1d575c3132767eb5b0116f93b881cbd
MD5 hash:
7f0b24167aec9cd87a971026e2cf8866
SHA1 hash:
89c814a3b9d8a4245d38e982f8ac11c759e6f0ff
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments