MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7bd7adfd85c84e29ce72c2ba639eb3efa369111461e04acccec00beabfd86b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: c7bd7adfd85c84e29ce72c2ba639eb3efa369111461e04acccec00beabfd86b5
SHA3-384 hash: 65c9649ad8419a60c097a9063799eaf56c2636a31d2390299fa7ca6d749dcb56b383d5bad2a72dbf3b951c6113621001
SHA1 hash: 9774c47da587d939210280d6c71f4cb3b647f4db
MD5 hash: 92a0abe9c71c262a3f96136990624e06
humanhash: eleven-early-romeo-xray
File name:Appraisal.vbs
Download: download sample
Signature RemcosRAT
File size:2'398 bytes
First seen:2021-05-20 17:42:20 UTC
Last seen:2021-05-20 18:27:26 UTC
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 48:f+n9+mUBVECDUx4p2uAROMqoUn/VhClD+Rh:GnQm0qCDEO20/jC8X
Threatray 232 similar samples on MalwareBazaar
TLSH D7415121B3AACFAA743279710122947C32C98DE6BC9271484CC6C6F785A45DA87B1C63
Reporter abuse_ch
Tags:RAT RemcosRAT vbs

Intelligence


File Origin
# of uploads :
2
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Sending a UDP request
Creating a file
Creating a process from a recently created file
Enabling the 'hidden' option for recently created files
Reading critical registry keys
Deleting a recently created file
Creating a file in the %AppData% subdirectories
Stealing user critical data
Creating a file in the %temp% directory
Enabling autorun by creating a file
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Threat name:
Script.Downloader.Heuristic
Status:
Malicious
First seen:
2021-05-20 17:43:11 UTC
AV detection:
6 of 47 (12.77%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos rat
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Blocklisted process makes network request
Remcos
Malware Config
C2 Extraction:
185.19.85.168:1723
Dropper Extraction:
https://ia601505.us.archive.org/33/items/all_20210520_20210520_1122/ALL.TXT
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments