MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0b0ce80bba6791a850094710f1f240de13d9498096e4072e2cb8ef58f9fd329. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: d0b0ce80bba6791a850094710f1f240de13d9498096e4072e2cb8ef58f9fd329
SHA3-384 hash: 3925d0de65a460e30c4f319e05d35cb5f4dc6484bf06cf847fbf32762e930e7ab123b309e3bbbb060382377ba9ad0ef9
SHA1 hash: e1395f5c5140af0568b94ad502ac139960e4de47
MD5 hash: 45fa69f5a2de3b3dddb5156ff7bded8d
humanhash: friend-happy-maryland-red
File name:ImageScanDocumentfiles000198373.LNK
Download: download sample
Signature RemcosRAT
File size:202'571 bytes
First seen:2025-04-10 18:01:13 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/octet-stream
ssdeep 6144:d+E4+dxj+B4NYOrMHknkaUf38mEmwMguHx33PGO:Ez+f+Gu1f38moONj
Threatray 756 similar samples on MalwareBazaar
TLSH T1EB14F295CB722FCEEF5D15BC04BF6949484D6C323D22C8F5D69E1A0B4138E8719D2A2B
Magika lnk
Reporter abuse_ch
Tags:lnk RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
autorun delphi emotet lien
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Payload URLs
URL
File name
https://huadongrubbercable.com/vickk/r.txt','C:\\Users\\Public\\png');
LNK File
Behaviour
BlacklistAPI detected
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates many large memory junks
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Detected Remcos RAT
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Encrypted powershell cmdline option found
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sample uses process hollowing technique
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell DownloadFile
Sigma detected: Remcos
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows shortcut file (LNK) contains suspicious command line arguments
Windows shortcut file (LNK) starts blacklisted processes
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1662324 Sample: ImageScanDocumentfiles00019... Startdate: 10/04/2025 Architecture: WINDOWS Score: 100 66 huadongrubbercable.com 2->66 68 geoplugin.net 2->68 78 Suricata IDS alerts for network traffic 2->78 80 Found malware configuration 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 22 other signatures 2->84 9 powershell.exe 14 30 2->9         started        14 rundll32.exe 3 2->14         started        16 rundll32.exe 2->16         started        18 svchost.exe 1 1 2->18         started        signatures3 process4 dnsIp5 74 huadongrubbercable.com 198.54.114.164, 443, 49681 NAMECHEAP-NETUS United States 9->74 62 C:\Users\Public\CHROME.PIF, PE32 9->62 dropped 64 C:\Users\Public\png, ASCII 9->64 dropped 110 Drops PE files to the user root directory 9->110 112 Drops PE files with a suspicious file extension 9->112 114 Found suspicious powershell code related to unpacking or dynamic code loading 9->114 116 2 other signatures 9->116 20 CHROME.PIF 4 23 9->20         started        25 conhost.exe 1 9->25         started        27 Rwrpdshk.PIF 14->27         started        29 Rwrpdshk.PIF 16->29         started        76 127.0.0.1 unknown unknown 18->76 file6 signatures7 process8 dnsIp9 70 196.251.69.136, 3421, 49693, 49694 Web4AfricaZA Seychelles 20->70 72 geoplugin.net 178.237.33.50, 49695, 80 ATOM86-ASATOM86NL Netherlands 20->72 56 C:\Users\user\Links\Rwrpdshk.PIF, PE32 20->56 dropped 58 C:\ProgramData\yu\logs.dat, data 20->58 dropped 86 Windows shortcut file (LNK) starts blacklisted processes 20->86 88 Multi AV Scanner detection for dropped file 20->88 90 Detected Remcos RAT 20->90 102 8 other signatures 20->102 31 cmd.exe 1 20->31         started        34 recover.exe 20->34         started        36 recover.exe 20->36         started        38 4 other processes 20->38 92 Contains functionality to bypass UAC (CMSTPLUA) 27->92 94 Contains functionalty to change the wallpaper 27->94 96 Contains functionality to steal Chrome passwords or cookies 27->96 98 Contains functionality to steal Firefox passwords or cookies 27->98 100 Allocates many large memory junks 29->100 file10 signatures11 process12 signatures13 118 Uses schtasks.exe or at.exe to add and modify task schedules 31->118 40 esentutl.exe 2 31->40         started        44 conhost.exe 31->44         started        46 alpha.pif 2 31->46         started        48 alpha.pif 2 31->48         started        120 Tries to steal Mail credentials (via file registry) 34->120 122 Tries to harvest and steal browser information (history, passwords, etc) 34->122 124 Tries to steal Instant Messenger accounts or passwords 36->124 126 Tries to steal Mail credentials (via file / registry access) 36->126 50 conhost.exe 38->50         started        52 conhost.exe 38->52         started        54 schtasks.exe 1 38->54         started        process14 file15 60 C:\Users\Public\alpha.pif, PE32 40->60 dropped 104 Drops PE files to the user root directory 40->104 106 Drops PE files with a suspicious file extension 40->106 108 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 40->108 signatures16
Threat name:
Win32.Trojan.WinLnk
Status:
Malicious
First seen:
2025-04-10 09:51:13 UTC
File Type:
Binary
Extracted files:
1
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader discovery execution trojan
Behaviour
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
ModiLoader Second Stage
ModiLoader, DBatLoader
Modiloader family
Malware Config
Dropper Extraction:
https://huadongrubbercable.com/vickk/r.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:Large_filesize_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file larger than 100KB. Most goodware LNK files are smaller than 100KB.
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_SuspiciousCommands
Author:Florian Roth (Nextron Systems)
Description:Detects LNK file with suspicious content
Rule name:Warp
Author:Seth Hardy
Description:Warp
Rule name:WarpStrings
Author:Seth Hardy
Description:Warp Identifying Strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments