MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc5e5b32cee20470d93b3152c3cb5faeee1434a11e07b5ac5efaa76fe1221034. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: bc5e5b32cee20470d93b3152c3cb5faeee1434a11e07b5ac5efaa76fe1221034
SHA3-384 hash: a6c81fd5311333e0f7f7091edd2d18591b406db73dc26c70e4bc2a594be6b3647ad59950ec55690f5b59250dbe052b31
SHA1 hash: b45279594d4d7f9b161458593ac5d007d8758afa
MD5 hash: 27cef70a62f86294bd81b32ac6f96890
humanhash: stairway-leopard-kansas-minnesota
File name:27cef70a62f86294bd81b32ac6f96890.exe
Download: download sample
Signature RemcosRAT
File size:778'240 bytes
First seen:2023-01-31 16:45:22 UTC
Last seen:2023-01-31 18:33:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f0165a9d7bcfb8fa29fd32e4d73bad5d (2 x RemcosRAT)
ssdeep 12288:nXCSJ638aXV+o1zl3qJVkdRTYJO8t8q0NVlstZo1NkB0lEKjh4jieNt:yUk+o10JVE+Jl8FNHkmNkBPKhheN
TLSH T1BBF48CAEB2B4C433E03317B59D6B57E98832BC215D28D8476BD678CCAF3A7453429193
TrID 22.3% (.EXE) Win32 Executable Delphi generic (14182/79/4)
20.6% (.SCR) Windows screen saver (13097/50/3)
16.5% (.EXE) Win64 Executable (generic) (10523/12/4)
15.7% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
7.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 64c4c4e4e9c7c4d4 (2 x RemcosRAT)
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
149.202.8.123:2404

Intelligence


File Origin
# of uploads :
2
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
thinkingofyou.exe
Verdict:
Malicious activity
Analysis date:
2023-01-27 20:14:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
keylogger packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected unpacking (creates a PE file in dynamic memory)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 795354 Sample: XOY22vcFGw.exe Startdate: 31/01/2023 Architecture: WINDOWS Score: 100 77 Snort IDS alert for network traffic 2->77 79 Multi AV Scanner detection for domain / URL 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 10 other signatures 2->83 10 XOY22vcFGw.exe 1 23 2->10         started        15 Fraeluyv.exe 1 2->15         started        17 Fraeluyv.exe 2->17         started        process3 dnsIp4 67 zkhifq.bn.files.1drv.com 10->67 69 onedrive.live.com 10->69 71 bn-files.fe.1drv.com 10->71 55 C:\Users\Public\Libraries\netutils.dll, PE32+ 10->55 dropped 57 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 10->57 dropped 59 C:\Users\Public\Libraries\Fraeluyv.exe, PE32 10->59 dropped 61 C:\Users\...\Fraeluyv.exe:Zone.Identifier, ASCII 10->61 dropped 97 Writes to foreign memory regions 10->97 99 Allocates memory in foreign processes 10->99 101 Creates a thread in another existing process (thread injection) 10->101 19 cmd.exe 3 10->19         started        22 vyulearF.pif 10->22         started        24 conhost.exe 10->24         started        63 C:\Users\Public\Libraries\vyulearF.pif, PE32 15->63 dropped 103 Antivirus detection for dropped file 15->103 105 Multi AV Scanner detection for dropped file 15->105 107 Machine Learning detection for dropped file 15->107 109 Drops PE files with a suspicious file extension 15->109 26 vyulearF.pif 15->26         started        111 Injects a PE file into a foreign processes 17->111 29 vyulearF.pif 17->29         started        file5 signatures6 process7 dnsIp8 85 Uses ping.exe to sleep 19->85 87 Drops executables to the windows directory (C:\Windows) and starts them 19->87 89 Uses ping.exe to check the status of other devices and networks 19->89 31 easinvoker.exe 19->31         started        33 PING.EXE 1 19->33         started        36 xcopy.exe 2 19->36         started        39 6 other processes 19->39 73 www.christopherferr.com 149.202.8.123, 2404, 49701 OVHFR France 26->73 75 geoplugin.net 178.237.33.50, 49702, 80 ATOM86-ASATOM86NL Netherlands 26->75 91 Detected unpacking (creates a PE file in dynamic memory) 26->91 signatures9 process10 dnsIp11 41 cmd.exe 1 31->41         started        65 127.0.0.1 unknown unknown 33->65 51 C:\Windows \System32\easinvoker.exe, PE32+ 36->51 dropped 53 C:\Windows \System32\netutils.dll, PE32+ 39->53 dropped file12 process13 signatures14 93 Suspicious powershell command line found 41->93 95 Adds a directory exclusion to Windows Defender 41->95 44 powershell.exe 19 41->44         started        47 conhost.exe 41->47         started        process15 signatures16 113 DLL side loading technique detected 44->113 49 conhost.exe 44->49         started        process17
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-01-27 14:15:14 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
29 of 39 (74.36%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:sky-yak persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
www.christopherferr.com:2404
Unpacked files
SH256 hash:
17bac612c9b6cf52b198ee1eb70003c8f86eeefe21305f3c63858bb77e2c322c
MD5 hash:
7b72abb55df82ba832e2819ebe7cbf45
SHA1 hash:
2db357f40c6816cf1386bf248fb338b203ffb3dc
Detections:
win_dbatloader_g1
Parent samples :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 hash:
bc5e5b32cee20470d93b3152c3cb5faeee1434a11e07b5ac5efaa76fe1221034
MD5 hash:
27cef70a62f86294bd81b32ac6f96890
SHA1 hash:
b45279594d4d7f9b161458593ac5d007d8758afa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments