MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c48a8f7228fef242ad2ed17adfb9fb4f7fb952e3a52ff235422f062eedab86e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 5
| SHA256 hash: | c48a8f7228fef242ad2ed17adfb9fb4f7fb952e3a52ff235422f062eedab86e3 |
|---|---|
| SHA3-384 hash: | 35f21411b688b60f8ab44dc62c3af81071aa14eb9359c57d044e3fd7e1fe37586a6235269a9363fa6f9536df3852c88a |
| SHA1 hash: | a8a113e26712134f07acb8b8830943f23311c63f |
| MD5 hash: | 96541268610f9f8557f4ed5d1b6cf842 |
| humanhash: | stream-wyoming-edward-iowa |
| File name: | Quotation_879_CHN_03-02-2021.zip |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 533'080 bytes |
| First seen: | 2021-02-03 18:17:50 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:4RPVL4Or70KSkPL+RrvWcGwiFwmAX/MhHQQ08N553T:4j4A7R+Z3V0VBr3T |
| TLSH | CEB423149A6414E9C3BEFE89480ED40DB47774470EE2D86A7DFE6BEB402B5122DE3718 |
| Reporter | |
| Tags: | nVpn RAT RemcosRAT zip |
abuse_ch
Malspam distributing RemcosRAT:HELO: c.ccs.org.cn
Sending IP: 36.110.92.137
From: 任彦胜<renyansheng@c.ccs.org.cn>
Subject: Request-For-Quotation DP-03_02_2021-6TW234
Attachment: Quotation_879_CHN_03-02-2021.zip (contains "Quotation_87903-02-2021.exe")
RemcosRAT C2:
cjmoneykelvincrugar.duckdns.org:20944 (194.5.97.178)
Pointing to nVpn:
% Information related to '194.5.97.0 - 194.5.97.255'
% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@privacyfirst.sh'
inetnum: 194.5.97.0 - 194.5.97.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-UK5
country: GB
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
mnt-by: PRIVACYFIRST-MNT
status: SUB-ALLOCATED PA
created: 2018-07-23T09:31:45Z
last-modified: 2020-08-26T17:48:55Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2021-02-03 18:18:07 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Gamarue
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.