MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be63bed59267683057545aebde3e553ca5f270b6750ab9285b881fec0ddd5dac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 13 File information Comments

SHA256 hash: be63bed59267683057545aebde3e553ca5f270b6750ab9285b881fec0ddd5dac
SHA3-384 hash: 19f163c02c6da435d545d8f558d886f648dfb2d4784b28b179df36bb8ecb91d9f70dfe79387d26ed9907f43f7d898b56
SHA1 hash: d29de9a71cf3b1708bc0375c51fdbb25fb15bf32
MD5 hash: 8598f657885173256e450b76296a5f38
humanhash: bulldog-eight-magazine-alabama
File name:Urgent RFQAP65425652032421,pdf.exe
Download: download sample
Signature RemcosRAT
File size:1'027'224 bytes
First seen:2021-06-18 10:06:24 UTC
Last seen:2021-06-18 11:44:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2f23599b8bdd1ddfb668f4b1b06d241f (1 x RemcosRAT, 1 x Formbook)
ssdeep 12288:0Dz2Q7Q291DyIe5y+SKera8JzsP0XmoX/7TCOcbbkXbweFjqX0uNb+T0HXX+jBnD:0DyQ7h2y+SKS2Vy3Ibk8eZq/XQB
Threatray 1'983 similar samples on MalwareBazaar
TLSH C1258D1DB6524833CD332BFDAD0B52A8583B3E513D64DD4A3BB939457E39381392A09B
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
185.140.53.9:8905

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.140.53.9:8905 https://threatfox.abuse.ch/ioc/136293/

Intelligence


File Origin
# of uploads :
3
# of downloads :
147
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Urgent RFQAP65425652032421,pdf.exe
Verdict:
Malicious activity
Analysis date:
2021-06-18 10:12:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Detected Remcos RAT
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 436669 Sample: Urgent RFQAP65425652032421,... Startdate: 18/06/2021 Architecture: WINDOWS Score: 100 51 Malicious sample detected (through community Yara rule) 2->51 53 Detected Remcos RAT 2->53 55 Yara detected Remcos RAT 2->55 57 Machine Learning detection for sample 2->57 8 Urgent RFQAP65425652032421,pdf.exe 1 23 2->8         started        13 Oubzuzx.exe 16 2->13         started        15 Oubzuzx.exe 16 2->15         started        process3 dnsIp4 37 txyudw.dm.files.1drv.com 8->37 39 onedrive.live.com 8->39 41 dm-files.fe.1drv.com 8->41 33 C:\Users\Public\Libraries\...\Oubzuzx.exe, PE32 8->33 dropped 67 Writes to foreign memory regions 8->67 69 Allocates memory in foreign processes 8->69 71 Creates a thread in another existing process (thread injection) 8->71 17 mobsync.exe 2 8->17         started        21 cmd.exe 1 8->21         started        43 txyudw.dm.files.1drv.com 13->43 47 2 other IPs or domains 13->47 73 Machine Learning detection for dropped file 13->73 75 Injects a PE file into a foreign processes 13->75 23 mobsync.exe 13->23         started        45 txyudw.dm.files.1drv.com 15->45 49 2 other IPs or domains 15->49 25 dialer.exe 15->25         started        file5 signatures6 process7 dnsIp8 35 zubby2468.hopto.org 185.140.53.9, 49768, 49772, 49778 DAVID_CRAIGGG Sweden 17->35 59 Contains functionality to steal Chrome passwords or cookies 17->59 61 Contains functionality to capture and log keystrokes 17->61 63 Contains functionality to inject code into remote processes 17->63 65 Contains functionality to steal Firefox passwords or cookies 17->65 27 cmd.exe 1 21->27         started        29 conhost.exe 21->29         started        signatures9 process10 process11 31 conhost.exe 27->31         started       
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2021-06-18 10:07:09 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:blessed persistence rat
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Adds Run key to start application
Blocklisted process makes network request
Remcos
Malware Config
C2 Extraction:
zubby2468.hopto.org:8905
Unpacked files
SH256 hash:
5381c6276fc0f552d71efe7fb4d43a9e1a1e776c4cb7a572f72207b777ff2a32
MD5 hash:
3e9b080fb62948db627a904b7af653ea
SHA1 hash:
93a66126bdeb846724b41d44c6a7cac15c5ed636
SH256 hash:
be63bed59267683057545aebde3e553ca5f270b6750ab9285b881fec0ddd5dac
MD5 hash:
8598f657885173256e450b76296a5f38
SHA1 hash:
d29de9a71cf3b1708bc0375c51fdbb25fb15bf32
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:INDICATOR_KB_CERT_0be3f393d1ef0272aed0e2319c1b5dd0
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EnvVarScheduledTasks
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC (ab)using Environment Variables in Scheduled Tasks
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments