MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c7e2ce7b8a6da88127cbb0730c2b8b9869f7f0e6a4ba831e34d1aa18122ce5e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 18
| SHA256 hash: | c7e2ce7b8a6da88127cbb0730c2b8b9869f7f0e6a4ba831e34d1aa18122ce5e2 |
|---|---|
| SHA3-384 hash: | 64ed89223a7dacb5d87c4844e6630a6ca0cf0ac4e620a8375d9a95f4c5fd742f261e2fd27dd78703908343159dd6eddc |
| SHA1 hash: | b00736f14237682249bf28239ec1f6be55fa1b86 |
| MD5 hash: | f92ebc5dca13934c2bff50fe8036f41d |
| humanhash: | hot-bulldog-asparagus-jupiter |
| File name: | Draft Contract.pdf.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 524'448 bytes |
| First seen: | 2023-02-08 18:20:34 UTC |
| Last seen: | 2023-02-08 19:45:49 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader) |
| ssdeep | 12288:7Y7K5STwrqG12X2+aZONvVjeuBukSkDZUBrzK:7Y73wWe2XaENvxPlUtK |
| Threatray | 2'611 similar samples on MalwareBazaar |
| TLSH | T178B423107EB6DA8BC49642367CAE8F254FA74D1C0592920F37052F18BF7A24BDE4D762 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | cc133317372b7673 (18 x SnakeKeylogger, 4 x PureCrypter, 2 x Formbook) |
| Reporter | |
| Tags: | exe RAT RemcosRAT |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
4f3ac2facaae4e74a303e1c92b36c87372397fa19f93d3025cc6fa5c027a7b29
c03cfddda1ce6811ac0aa6cd6d9957e688a3fd37c02a16c15af285bff2c9b04f
c51b5ab4f58954b8e389c8fbd8b7774de8365a5222a6a34eeb2a13d152245b83
6c0f5a9bf9bfd84be91f3d84335b63ac95ac2b227fedc5de439971577328ac30
6c405e0fb6fa88a355b6addac57f8663af6a0e2256bc8d23da104567360ce6f9
fa965dc6edbb0e244cef4ecab1dabb2d04c9c174e42ac25c60f463237bcea16b
d3a2043efc6af7c4ab5141626759c855ae393005862d78c7e325ba585684c5b0
c7e2ce7b8a6da88127cbb0730c2b8b9869f7f0e6a4ba831e34d1aa18122ce5e2
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer |
|---|---|
| Author: | ditekSHen |
| Description: | detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
| Rule name: | Remcos |
|---|---|
| Author: | kevoreilly |
| Description: | Remcos Payload |
| Rule name: | remcos_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | REMCOS_RAT_variants |
|---|
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Windows_Trojan_Remcos_b296e965 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_remcos_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.remcos. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.