MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d446f3c94c08272b51766faa63a5c716827d37040d9222819519c5124735a4be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 14
| SHA256 hash: | d446f3c94c08272b51766faa63a5c716827d37040d9222819519c5124735a4be |
|---|---|
| SHA3-384 hash: | 7f4888cef33a0f3d5e1a11d33652505bc38e957cccb0056572824f1b24ecf37be74c33feed1ea6d87ae37a02822ff803 |
| SHA1 hash: | c65dff9a3400fb61fa0a7835b2ba50ac42231d3b |
| MD5 hash: | dfbe70bd5626db2a1bd2522912c72135 |
| humanhash: | timing-william-virginia-diet |
| File name: | dhl awb 3452778287 shipping delivery notification,pdf.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 1'050'624 bytes |
| First seen: | 2022-08-30 08:23:41 UTC |
| Last seen: | 2022-08-30 08:34:25 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 45e97a00ecbd587477169510db95872b (5 x RemcosRAT, 3 x ModiLoader, 2 x FormBook) |
| ssdeep | 24576:DJLADyaLg23PYHKiMtkku4nzSrmdN40JIyE9WDvk:DJEDfg23w4tkku4nzSrmdmWbaW |
| TLSH | T13525BFF7B3E08633C0631A78CE5B5354A839BE101A24948A77F52D4CDF7869179392EB |
| TrID | 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61) 4.2% (.EXE) InstallShield setup (43053/19/16) 1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4) 1.2% (.SCR) Windows screen saver (13101/52/3) |
| File icon (PE): | |
| dhash icon | eef2eed69696eabe (10 x RemcosRAT, 8 x ModiLoader, 6 x Formbook) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
283
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dhl awb 3452778287 shipping delivery notification,pdf.exe
Verdict:
Suspicious activity
Analysis date:
2022-08-30 08:25:55 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Searching for the window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
greyware keylogger remcos zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected Remcos RAT
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Remcos
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-08-30 08:24:12 UTC
File Type:
PE (Exe)
Extracted files:
91
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
remcos
Result
Malware family:
remcos
Score:
10/10
Tags:
family:modiloader family:remcos botnet:remotehost persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
julygoals.hopto.org:7446
Unpacked files
SH256 hash:
dd98aba7a667aa34e7883503f23b3f8efff8b4b56e22f753a72b37c14a3127b3
MD5 hash:
dfd91793d4bb73bb475e0acecf94c9f7
SHA1 hash:
f5ec6cb9eeae23da65a478b614b9b74370878670
Detections:
win_dbatloader_g1
Parent samples :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 hash:
d446f3c94c08272b51766faa63a5c716827d37040d9222819519c5124735a4be
MD5 hash:
dfbe70bd5626db2a1bd2522912c72135
SHA1 hash:
c65dff9a3400fb61fa0a7835b2ba50ac42231d3b
Malware family:
Remcos
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.