MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ce017a03e71e8121a53b848e8fb3bdfbe96d03e68ee9baa1eb77e9a1357932bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 5
| SHA256 hash: | ce017a03e71e8121a53b848e8fb3bdfbe96d03e68ee9baa1eb77e9a1357932bb |
|---|---|
| SHA3-384 hash: | d91b890b4c3dd223bdc328554863fe3f791ab7b20cf54cb78a8129137dba097f4dccb6b9dd12e91128478aec833d7b97 |
| SHA1 hash: | 78b5754260a4b340069e72ceddeb92b667495cb8 |
| MD5 hash: | ee654c8cf7c147ff8049d329a4019e84 |
| humanhash: | violet-video-butter-bakerloo |
| File name: | PurchaseOrder_2021676777.zip |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 570'372 bytes |
| First seen: | 2021-03-04 15:25:29 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:mEruEIlrk+H/cGsxZ0GYLq0zsvmdNRzn7SZE3Oyz7Yq:mEe3H/cG47Speafqw9zJ |
| TLSH | 2BC42391EB6144E5851FE147316E1A6BCC3C1D3C06B1EF1A00CDBF3A16AF935926297E |
| Reporter | |
| Tags: | RAT RemcosRAT zip |
abuse_ch
Malspam distributing RemcosRAT:HELO: jetmails.uno
Sending IP: 103.109.37.153
From: CONNFLY<admin@jetmails.uno>
Subject: CONNFLY - March 2021 Requisitions
Attachment: PurchaseOrder_2021676777.zip (contains "PurchaseOrder_2021676777.exe")
RemcosRAT C2:
grace111.ddns.net
Intelligence
File Origin
# of uploads :
1
# of downloads :
310
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-04 15:26:07 UTC
AV detection:
4 of 48 (8.33%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.65
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.