MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be8ccfb19dab5c8d7b4273dc77b34c7ca0afea516e6bf85f607904345a3ad54f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 15 File information Comments

SHA256 hash: be8ccfb19dab5c8d7b4273dc77b34c7ca0afea516e6bf85f607904345a3ad54f
SHA3-384 hash: 240ef8963a46ae1e5e3bf8b43e1a72bdcba23f5300f7252b874122329f205bc7bf50b1c0f57d14c9228b2a214fe815f0
SHA1 hash: 2d2ed3fb837bc24b20ede4eee39a51e3c0b370dd
MD5 hash: a66b19091096d7db36c61e56118b427f
humanhash: papa-illinois-black-stairway
File name:SecuriteInfo.com.W32.MSIL_Kryptik.JTX.gen.Eldorado.28214.2563
Download: download sample
Signature RemcosRAT
File size:2'011'648 bytes
First seen:2023-10-10 12:35:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 49152:7w1ucZTOclUFLaDqF1O+h9sRYL6o2nLR:7mucZHCA+hG+L6o2nV
Threatray 2'664 similar samples on MalwareBazaar
TLSH T1BC95F703BA4789E2C148573AC5BB0C3603A4D581739BF61E798BA36519437BA7A4FD0F
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
322
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.W32.MSIL_Kryptik.JTX.gen.Eldorado.28214.2563
Verdict:
Malicious activity
Analysis date:
2023-10-10 15:03:04 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Sending a TCP request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade packed remcos
Verdict:
Malicious
Labled as:
MSIL/GenKryptik_AGeneric.RQ trojan
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to modify clipboard data
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2023-10-10 12:36:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
17 of 22 (77.27%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost rat
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Remcos
Malware Config
C2 Extraction:
64.112.85.218:4888
Unpacked files
SH256 hash:
608f583119becbebbec6ee5fe63ffcec974f42bc2c34cf961d70ebc34647bdf3
MD5 hash:
3a1ba43a00925be0dea2459d75605f32
SHA1 hash:
b388a141126fee0e3f4374cfe67abd08fe9d230c
Detections:
Remcos win_remcos_w0 win_remcos_auto
SH256 hash:
5d24cda4a7657e28ad620ceecebc7958f507c396ace750cfc342d69369a5ee6b
MD5 hash:
c49d2a33c91649e1c70c7c497c383095
SHA1 hash:
83fcc08af812cea09b9106916960a19a051c45ca
SH256 hash:
89fa21c8d501c49b94160a551576b3f10a7bc26e76790d0d4d1cd224e0394967
MD5 hash:
fe4eccd379ccf003cd946fce847ad39f
SHA1 hash:
3bf353906a5cc12cd8b0fc424bc078cc6ec6c6cd
SH256 hash:
46d8fc936cab5987907d343d8817c8fd9f913a53049b1f5cb045f44b408652eb
MD5 hash:
b385da0b6e97fce266b46bf166e597c5
SHA1 hash:
2ad0974a2d43ef3974429a0dbc157140c4b09c5c
SH256 hash:
be8ccfb19dab5c8d7b4273dc77b34c7ca0afea516e6bf85f607904345a3ad54f
MD5 hash:
a66b19091096d7db36c61e56118b427f
SHA1 hash:
2d2ed3fb837bc24b20ede4eee39a51e3c0b370dd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.
Rule name:win_remcos_rat_unpacked
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:win_remcos_w0
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments