MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c48a8f7228fef242ad2ed17adfb9fb4f7fb952e3a52ff235422f062eedab86e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: c48a8f7228fef242ad2ed17adfb9fb4f7fb952e3a52ff235422f062eedab86e3
SHA3-384 hash: 35f21411b688b60f8ab44dc62c3af81071aa14eb9359c57d044e3fd7e1fe37586a6235269a9363fa6f9536df3852c88a
SHA1 hash: a8a113e26712134f07acb8b8830943f23311c63f
MD5 hash: 96541268610f9f8557f4ed5d1b6cf842
humanhash: stream-wyoming-edward-iowa
File name:Quotation_879_CHN_03-02-2021.zip
Download: download sample
Signature RemcosRAT
File size:533'080 bytes
First seen:2021-02-03 18:17:50 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:4RPVL4Or70KSkPL+RrvWcGwiFwmAX/MhHQQ08N553T:4j4A7R+Z3V0VBr3T
TLSH CEB423149A6414E9C3BEFE89480ED40DB47774470EE2D86A7DFE6BEB402B5122DE3718
Reporter abuse_ch
Tags:nVpn RAT RemcosRAT zip


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: c.ccs.org.cn
Sending IP: 36.110.92.137
From: 任彦胜<renyansheng@c.ccs.org.cn>
Subject: Request-For-Quotation DP-03_02_2021-6TW234
Attachment: Quotation_879_CHN_03-02-2021.zip (contains "Quotation_87903-02-2021.exe")

RemcosRAT C2:
cjmoneykelvincrugar.duckdns.org:20944 (194.5.97.178)

Pointing to nVpn:

% Information related to '194.5.97.0 - 194.5.97.255'

% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@privacyfirst.sh'

inetnum: 194.5.97.0 - 194.5.97.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-UK5
country: GB
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
mnt-by: PRIVACYFIRST-MNT
status: SUB-ALLOCATED PA
created: 2018-07-23T09:31:45Z
last-modified: 2020-08-26T17:48:55Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2021-02-03 18:18:07 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

zip c48a8f7228fef242ad2ed17adfb9fb4f7fb952e3a52ff235422f062eedab86e3

(this sample)

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments