MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d25cb20e8516de827aaac00dd75638290b28d8a4ab4c8721c4f0d9cccd33f2c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: d25cb20e8516de827aaac00dd75638290b28d8a4ab4c8721c4f0d9cccd33f2c7
SHA3-384 hash: 9f322151fb033158e3f1d9e4b600ce41c51a20277e5376db9ee09a8fc3b646bb34e23bf719fce8906134068061a4b53b
SHA1 hash: 4beab76aae52f87ededf5231e063b05787863c81
MD5 hash: 496a3b154fc5024bbdc83facc1b3e76b
humanhash: yellow-mississippi-california-vegan
File name:scan.exe
Download: download sample
Signature RemcosRAT
File size:737'184 bytes
First seen:2026-01-27 07:36:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 103 x GuLoader, 64 x DiamondFox)
ssdeep 12288:MgN9Fhsuv2/XOm/MpcQPl2J4UEpU6GoHLTYrIenKlf5GCexx6C7uQbd9SkZD:MgN9FhsP/XOqm2pEzgZxxx6CyQbdvR
Threatray 2'527 similar samples on MalwareBazaar
TLSH T162F423042958A077D6B64A321DF9B3757BA43C7E2DB81B0F33A15F0EB4BBAB14814B54
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon a67773555d7973a6 (7 x RemcosRAT, 2 x GuLoader)
Reporter lowmal3
Tags:exe RemcosRAT signed

Code Signing Certificate

Organisation:Cuve
Issuer:Cuve
Algorithm:sha256WithRSAEncryption
Valid from:2026-01-23T08:34:23Z
Valid to:2027-01-23T08:34:23Z
Serial number: 704b307b3226799f7f07a763ae8001cce2644ce5
Thumbprint Algorithm:SHA256
Thumbprint: dbdb320454c47e6e9c4951e0487c8f1beaca9da0febb0d04b9ed73efc24d8493
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
86ab1a0f919fb2d5c693e3b2c208e0caf2c20ec4e25c6aab40c351fd37f7d324.zip
Verdict:
Malicious activity
Analysis date:
2026-01-27 05:16:21 UTC
Tags:
arch-exec remcos rat auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
injection obfusc crypt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole installer installer installer-heuristic microsoft_visual_cc nsis overlay signed similar-threat
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-26T23:49:00Z UTC
Last seen:
2026-01-29T04:38:00Z UTC
Hits:
~1000
Detections:
Trojan.NSIS.Makoob.sba Backdoor.Win32.Remcos.sb HEUR:Trojan.Win32.GuLoader.gen Trojan-Dropper.Win32.Injector.sb Trojan-Downloader.Win32.Minix.sb Trojan.Win32.Guloader.sb VHO:Backdoor.Win32.Remcos.gen
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
AI detected suspicious PE digital signature
Antivirus / Scanner detection for submitted sample
Found direct / indirect Syscall (likely to bypass EDR)
Multi AV Scanner detection for submitted file
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Unusual module load detection (module proxying)
Yara detected GuLoader
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2026-01-27 02:35:55 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:remotehost collection discovery downloader persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Contacts third-party web service commonly abused for C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Detected Nirsoft tools
NirSoft MailPassView
Guloader family
Guloader,Cloudeye
Remcos
Remcos family
Malware Config
C2 Extraction:
194.156.79.17:2404
Unpacked files
SH256 hash:
d25cb20e8516de827aaac00dd75638290b28d8a4ab4c8721c4f0d9cccd33f2c7
MD5 hash:
496a3b154fc5024bbdc83facc1b3e76b
SHA1 hash:
4beab76aae52f87ededf5231e063b05787863c81
SH256 hash:
acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506
MD5 hash:
6e55a6e7c3fdbd244042eb15cb1ec739
SHA1 hash:
070ea80e2192abc42f358d47b276990b5fa285a9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe d25cb20e8516de827aaac00dd75638290b28d8a4ab4c8721c4f0d9cccd33f2c7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments