MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d5eea8b6b2924e5f41d0562bd73b61267b99e3e7787d83d19ce5dd67f95feb85. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 19


Intelligence 19 IOCs YARA 6 File information Comments

SHA256 hash: d5eea8b6b2924e5f41d0562bd73b61267b99e3e7787d83d19ce5dd67f95feb85
SHA3-384 hash: 9a61f749eaf47b0761f92d195bb27756defed6b830ea042037c603094b90ac7134d6a80eb7dd1f538c44358278584892
SHA1 hash: 11fc2e8ea6a7684422e35fbe36bb8d1bbdaae4b0
MD5 hash: 9e71c6a08d573eb9e9e2bcdb65125845
humanhash: berlin-five-pluto-asparagus
File name:SWIFT.pif
Download: download sample
Signature RemcosRAT
File size:961'024 bytes
First seen:2025-03-04 08:27:33 UTC
Last seen:2025-03-04 09:48:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 24576:TZilzahbpAm2O9RsG4hb5hL8PgyQVtReas40DBa93:TZizakm2O9RkLQPgtsFJs
Threatray 1'082 similar samples on MalwareBazaar
TLSH T1121512A91215D717C9A053F55922F67427F85DDDB812EA038FEA6DEBBA6BF100C80343
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe pif RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
451
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
639151ee002d03885843eb1538177ea9d01c54dd08fa91b7402cc8ab933cf6bb
Verdict:
Malicious activity
Analysis date:
2025-03-03 16:05:47 UTC
Tags:
arch-exec rat remcos remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
virus shell micro
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a file
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Remcos
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1628927 Sample: SWIFT.pif.exe Startdate: 04/03/2025 Architecture: WINDOWS Score: 100 36 twc.trafficmanager.net 2->36 38 time.windows.com 2->38 40 4 other IPs or domains 2->40 46 Suricata IDS alerts for network traffic 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 11 other signatures 2->52 8 SWIFT.pif.exe 4 2->8         started        signatures3 process4 file5 32 C:\Users\user\AppData\...\SWIFT.pif.exe.log, ASCII 8->32 dropped 60 Writes to foreign memory regions 8->60 62 Allocates memory in foreign processes 8->62 64 Adds a directory exclusion to Windows Defender 8->64 66 Injects a PE file into a foreign processes 8->66 12 MSBuild.exe 2 16 8->12         started        17 MSBuild.exe 8->17         started        19 powershell.exe 23 8->19         started        signatures6 process7 dnsIp8 42 37.27.215.10, 1331, 49701, 55706 UNINETAZ Iran (ISLAMIC Republic Of) 12->42 44 geoplugin.net 178.237.33.50, 49712, 80 ATOM86-ASATOM86NL Netherlands 12->44 34 C:\ProgramData\remcos\logs.dat, data 12->34 dropped 68 Detected Remcos RAT 12->68 70 Maps a DLL or memory area into another process 12->70 72 Installs a global keyboard hook 12->72 21 MSBuild.exe 1 12->21         started        24 MSBuild.exe 1 12->24         started        26 MSBuild.exe 14 12->26         started        74 Tries to steal Mail credentials (via file registry) 17->74 76 Contains functionalty to change the wallpaper 17->76 78 Contains functionality to steal Chrome passwords or cookies 17->78 82 4 other signatures 17->82 80 Loading BitLocker PowerShell Module 19->80 28 WmiPrvSE.exe 19->28         started        30 conhost.exe 19->30         started        file9 signatures10 process11 signatures12 54 Tries to steal Instant Messenger accounts or passwords 21->54 56 Tries to harvest and steal browser information (history, passwords, etc) 21->56 58 Tries to steal Mail credentials (via file / registry access) 24->58
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2025-03-03 15:33:41 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Remcos
Remcos family
Malware Config
C2 Extraction:
37.27.215.10:1331
Unpacked files
SH256 hash:
d5eea8b6b2924e5f41d0562bd73b61267b99e3e7787d83d19ce5dd67f95feb85
MD5 hash:
9e71c6a08d573eb9e9e2bcdb65125845
SHA1 hash:
11fc2e8ea6a7684422e35fbe36bb8d1bbdaae4b0
SH256 hash:
0e6dbd2f027f9f8ba05e09099888aa9f98db5f1ce1038f0e5451201d9ada7e6f
MD5 hash:
c27a76ff06dd280c01533dfed134709a
SHA1 hash:
0f446823cc3801259d59280bd2d13267e5b91251
SH256 hash:
fae497ad6258f0a10487b994e9054123ec3bc2c82a327c23d1ca7b17309ac041
MD5 hash:
0af22b1e1e3410207b32c2eebb5baf2e
SHA1 hash:
433d2a0cd4abe17d026a29bde8bcba3207a888d5
Detections:
win_remcos_w0 win_remcos_auto Remcos malware_windows_remcos_rat win_remcos_rat_unpacked INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
SH256 hash:
480eb944db5e8e14c4956082c321101a85e57cec074d66fb675a361ac2bb3863
MD5 hash:
907f7b7c7bc8d4e4cc62c914a0ebe66c
SHA1 hash:
b4e4887bd64782e30338a9b7a2da89ff38105dd5
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments