MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c400fa0429a3b241dd2757ce322082c15786c3bb18eb71fe2ef3a1eb60c7e0d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: c400fa0429a3b241dd2757ce322082c15786c3bb18eb71fe2ef3a1eb60c7e0d8
SHA3-384 hash: bc857f4c3f79c9833389e1cb8f6a00c57bb480d1483d9c7570feada3f31abb8bc4e557125b7eb471767187f32ff34bf9
SHA1 hash: 6e6a7ed2f5b2301a74d67c94d67ae84cb1bcd91a
MD5 hash: 121bea217c0f5e700514e7354b6dfceb
humanhash: fifteen-delta-stream-arizona
File name:pagamento.exe
Download: download sample
Signature RemcosRAT
File size:897'488 bytes
First seen:2021-02-22 12:34:53 UTC
Last seen:2021-02-22 15:00:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 123e9c36cc1595f744449f97bcf23cbf (6 x RemcosRAT, 1 x Loki, 1 x Formbook)
ssdeep 24576:RYUkRHVFnyXv1qhqJ7ANT8QNE1C5h7bmhNK:RY9b0Uhq7hc
TLSH C6156EB29B4A4F22F06B143DCC4AE6F60715BC45372B59B71E98FB474AA2780B5E0077
Reporter JAMESWT_WT
Tags:RemcosRAT signed

Code Signing Certificate

Organisation:Word
Issuer:Word
Algorithm:sha1WithRSA
Valid from:2021-02-20T22:44:55Z
Valid to:2039-12-31T23:59:59Z
Serial number: 3f8b1d4c656982a34435f971c9f3c301
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: d251ece1b477449c75147a689c4a4e73241a0eee3131b751446a250e1b9d040f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
pagamento.exe
Verdict:
Malicious activity
Analysis date:
2021-02-22 08:14:48 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a UDP request
Sending a custom TCP request
Creating a file
Deleting a recently created file
Unauthorized injection to a recently created process
Connecting to a non-recommended domain
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Detected Remcos RAT
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Remcos
Sigma detected: Suspicious Program Location Process Starts
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2021-02-22 07:49:04 UTC
File Type:
PE (Exe)
Extracted files:
45
AV detection:
32 of 48 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos persistence rat
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
export.zapto.org:4021
Unpacked files
SH256 hash:
0e7586027be2b00d10dcc585232de1b4fe8f23be8298dad1f3bc86475946b5c9
MD5 hash:
ee5230700e4a146fed27eab5f8d9caa6
SHA1 hash:
809225fca3c38e5cd30eb35b9b667393becfb516
SH256 hash:
c400fa0429a3b241dd2757ce322082c15786c3bb18eb71fe2ef3a1eb60c7e0d8
MD5 hash:
121bea217c0f5e700514e7354b6dfceb
SHA1 hash:
6e6a7ed2f5b2301a74d67c94d67ae84cb1bcd91a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments