MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd63f226472363f922bbdd9d21c1821c0b97a12b9b369e53d482d0c412df63af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cd63f226472363f922bbdd9d21c1821c0b97a12b9b369e53d482d0c412df63af
SHA3-384 hash: 213c9f97327330947b5ffe2dbd97d7fb0fb21aa25c26a9a52cdcd6ce9346dfbb5441f5df357e42f5912fed8a2022da32
SHA1 hash: 3ee8c798c46b9d5371d79f6ab8e8e197f7a609ad
MD5 hash: 833afa81bb417fd53807d5bc23a743b6
humanhash: mars-oregon-lamp-fifteen
File name:Valid Prices.z
Download: download sample
Signature RemcosRAT
File size:108'994 bytes
First seen:2021-03-09 10:50:12 UTC
Last seen:2021-03-09 11:42:47 UTC
File type: zip
MIME type:application/zip
ssdeep 1536:ocEQOR5bRoYZofU7FlDtYL1I2uSg6ntoXMjY6Lnd/V2EFX1EkHL7:ohRR5bRFRlxYfuBXMLnpV2KFf/
TLSH AFB3121CC4B4F487D6A473BAD665010992BE51DE311BF2BC2904F5C226E63F44B9FA2E
Reporter abuse_ch
Tags:RAT RemcosRAT z


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: lucky1.263xmail.com
Sending IP: 211.157.147.133
From: 张贵强 <sale20@chinachuangxin.net>
Subject: Valid Prices
Attachment: Valid Prices.z (contains "Purchase Order.bat")

RemcosRAT C2:
feromo.duckdns.org:8087

Intelligence


File Origin
# of uploads :
2
# of downloads :
296
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2021-03-09 10:51:05 UTC
AV detection:
13 of 47 (27.66%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

zip cd63f226472363f922bbdd9d21c1821c0b97a12b9b369e53d482d0c412df63af

(this sample)

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments