MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c09a289502c5bf733a43098234e2d085d53fab557ff778e2fcd73e6c502a4fbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: c09a289502c5bf733a43098234e2d085d53fab557ff778e2fcd73e6c502a4fbb
SHA3-384 hash: f7b6c3608a3b2ac26655d28af2f6436e5083f74fc60d0df9da931cf809de912c6edc1a6421455c2bbb587d1189fd75cb
SHA1 hash: 6f1f3a1a9b9ddb38c4697b0c6da968fb50b0efc2
MD5 hash: 1dd0b52a3dc8cf4089a474ce314ce041
humanhash: vermont-kilo-apart-winter
File name:c09a289502c5bf733a43098234e2d085d53fab557ff778e2fcd73e6c502a4fbb
Download: download sample
Signature RemcosRAT
File size:1'212'960 bytes
First seen:2021-09-06 06:38:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT)
ssdeep 24576:YEfUzt0WsNtypnSHZNTZ5kB3z0mHaYfltT5Uf1tX:LUztHpS55C3QYaClnG1R
Threatray 1'713 similar samples on MalwareBazaar
TLSH T1A9459E0273919026FEAE92734B55A2415678F8297023CC3F12BBDF786B701621E7D66F
dhash icon 4be5c74fbfbd3bb7 (29 x RemcosRAT)
Reporter JAMESWT_WT
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c09a289502c5bf733a43098234e2d085d53fab557ff778e2fcd73e6c502a4fbb
Verdict:
Malicious activity
Analysis date:
2021-09-06 07:44:43 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a UDP request
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Query of malicious DNS domain
Enabling autorun by creating a file
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
AutoIt script contains suspicious strings
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2021-09-02 11:14:40 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
32 of 43 (74.42%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:admin rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
autoit_exe
Drops startup file
Remcos
Malware Config
C2 Extraction:
rem-pounds.ddns.net:9970
Unpacked files
SH256 hash:
94b37e1cbab651f75987b27fd437308b24a2ae215da571363c5d2e5451ed63c6
MD5 hash:
46d3df890c4c2fb398fa96680f55c44c
SHA1 hash:
422799d4b08b7a3bf18954df246e8b6986f3dfe1
Detections:
win_remcos_g0 win_remcos_auto
Parent samples :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 hash:
c09a289502c5bf733a43098234e2d085d53fab557ff778e2fcd73e6c502a4fbb
MD5 hash:
1dd0b52a3dc8cf4089a474ce314ce041
SHA1 hash:
6f1f3a1a9b9ddb38c4697b0c6da968fb50b0efc2
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments