MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c9ec59e23695adca831f06aca398c511cac81f2fd65c7353f14b4725791ab80a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments

SHA256 hash: c9ec59e23695adca831f06aca398c511cac81f2fd65c7353f14b4725791ab80a
SHA3-384 hash: 54a657f27a986bdd729bba7d45e626a07c583fa375319032b5606758701a968e9870d5b95507b8d459119635e38db0bc
SHA1 hash: f5a25cdae133bf6851e85c934d90508033d7b579
MD5 hash: df59dea5d8a77ae66f24cc7d25924cec
humanhash: harry-tango-neptune-arkansas
File name:Lecture 10.exe
Download: download sample
Signature RemcosRAT
File size:1'249'792 bytes
First seen:2023-03-26 01:32:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:al06MFYr0PLhaX7nXdrj1IJNf+QQCwQZI5RHsHgZfW4l0:alL8YnzU+QtC5RHsA
Threatray 1'734 similar samples on MalwareBazaar
TLSH T1BF45121637998B85C2BC67BD14F2904003BABF3B2352EB4D2EC630DA517BB99CA51753
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 00000c353034d4c0 (20 x SnakeKeylogger, 3 x Formbook, 3 x RemcosRAT)
Reporter Chainskilabs
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
286
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Lecture 10.exe
Verdict:
Malicious activity
Analysis date:
2023-03-25 19:49:58 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 834926 Sample: Lecture_10.exe Startdate: 26/03/2023 Architecture: WINDOWS Score: 100 108 Malicious sample detected (through community Yara rule) 2->108 110 Sigma detected: Scheduled temp file as task from temp location 2->110 112 Multi AV Scanner detection for submitted file 2->112 114 6 other signatures 2->114 9 Lecture_10.exe 7 2->9         started        13 ZgiXnjSvRpTK.exe 5 2->13         started        process3 file4 82 C:\Users\user\AppData\...\ZgiXnjSvRpTK.exe, PE32 9->82 dropped 84 C:\Users\...\ZgiXnjSvRpTK.exe:Zone.Identifier, ASCII 9->84 dropped 86 C:\Users\user\AppData\Local\...\tmpC9D9.tmp, XML 9->86 dropped 88 C:\Users\user\AppData\...\Lecture_10.exe.log, ASCII 9->88 dropped 116 Contains functionalty to change the wallpaper 9->116 118 Contains functionality to inject code into remote processes 9->118 120 Contains functionality to register a low level keyboard hook 9->120 126 3 other signatures 9->126 15 Lecture_10.exe 5 3 9->15         started        20 powershell.exe 22 9->20         started        22 schtasks.exe 1 9->22         started        122 Multi AV Scanner detection for dropped file 13->122 124 Injects a PE file into a foreign processes 13->124 24 schtasks.exe 13->24         started        26 ZgiXnjSvRpTK.exe 13->26         started        signatures5 process6 dnsIp7 100 ennenbach.duckdns.org 193.42.33.155, 49694, 49701, 49702 EENET-ASEE Germany 15->100 80 C:\ProgramData\remcos\logs.dat, data 15->80 dropped 102 Writes to foreign memory regions 15->102 104 Maps a DLL or memory area into another process 15->104 106 Installs a global keyboard hook 15->106 28 svchost.exe 15->28         started        30 svchost.exe 15->30         started        32 svchost.exe 15->32         started        40 2 other processes 15->40 34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        38 conhost.exe 24->38         started        file8 signatures9 process10 process11 42 chrome.exe 28->42         started        45 chrome.exe 28->45         started        47 chrome.exe 30->47         started        49 chrome.exe 30->49         started        51 chrome.exe 32->51         started        53 chrome.exe 32->53         started        55 chrome.exe 40->55         started        57 chrome.exe 40->57         started        59 2 other processes 40->59 dnsIp12 90 192.168.2.1 unknown unknown 42->90 92 239.255.255.250 unknown Reserved 42->92 61 chrome.exe 42->61         started        64 chrome.exe 45->64         started        66 chrome.exe 47->66         started        68 chrome.exe 49->68         started        70 chrome.exe 51->70         started        72 chrome.exe 53->72         started        74 chrome.exe 55->74         started        76 chrome.exe 57->76         started        78 2 other processes 59->78 process13 dnsIp14 94 mdec.nelreports.net 61->94 96 part-0032.t-0009.fdv2-t-msedge.net 13.107.237.60, 443, 49715, 49716 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 61->96 98 8 other IPs or domains 61->98
Threat name:
ByteCode-MSIL.Trojan.RemLoader
Status:
Malicious
First seen:
2023-03-23 13:04:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
35
AV detection:
23 of 37 (62.16%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost rat
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Remcos
Malware Config
C2 Extraction:
ennenbach.duckdns.org:5800
Unpacked files
SH256 hash:
e4f56636da4f9c625c498f97d3151eb65c804afd7d6ec559f6a9453cee2109f3
MD5 hash:
c7775f8a0bc6664dea9b42652a4463fc
SHA1 hash:
b861963ce8fc531c6750bc704fac6615ec41dc1c
SH256 hash:
d06df7395d561e198f9b7c5481567116ff2e4c2e84437c018d2a2c8ea6c4ca37
MD5 hash:
0fb6061f7d37424fb9e6d0e76b019c19
SHA1 hash:
98a64bf7b459f032d6ec5793003bf61b5ae1dd74
SH256 hash:
dd9b2c05d33e2b7c65e14d9466cfa53552e7f7178e77478f16b2ea832eda152b
MD5 hash:
d35c3b435c75e798ce7e4801883790fa
SHA1 hash:
7a7465aad67ac17f1f8365e7f389c18f95311edc
SH256 hash:
15ca78849861201e845b0146eed78e3a9887dd7f12193794b0a550498c0494ab
MD5 hash:
549ea2e6dd2144db2b2ceef0b88379b1
SHA1 hash:
2b570430800217b93b80b52b3e446ff2810a71ca
Detections:
Remcos win_remcos_auto
SH256 hash:
e1feb16a5ef439b478f2915ad878921cdaadbb87d9992dc59f3c4fc5f2a4a74e
MD5 hash:
8bcc89128791f87bf51dee24c444b7f1
SHA1 hash:
1b0c7eaa9a7ab41c4b7adc69b59dbf915e950612
SH256 hash:
c9ec59e23695adca831f06aca398c511cac81f2fd65c7353f14b4725791ab80a
MD5 hash:
df59dea5d8a77ae66f24cc7d25924cec
SHA1 hash:
f5a25cdae133bf6851e85c934d90508033d7b579
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe c9ec59e23695adca831f06aca398c511cac81f2fd65c7353f14b4725791ab80a

(this sample)

  
Delivery method
Distributed via web download

Comments