MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d661d0e5f0c691ce7a9602857de9d47e75802967d4375d6e9e01c0d7178b7f7f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments 1

SHA256 hash: d661d0e5f0c691ce7a9602857de9d47e75802967d4375d6e9e01c0d7178b7f7f
SHA3-384 hash: 61ac0adf3e6dc0cee1ae0afd7a4d412698c06e5c1be8c39f016c7d6c9e3d4b1709a1e4db786972f4199a3767d56862b0
SHA1 hash: 1b10608a4667263abc19d5dcda9ce4f0ff6fed04
MD5 hash: 66df0c33ed280cd37fec690523328dd6
humanhash: venus-golf-johnny-berlin
File name:d661d0e5f0c691ce7a9602857de9d47e75802967d4375d6e9e01c0d7178b7f7f
Download: download sample
Signature RemcosRAT
File size:923'138 bytes
First seen:2020-04-22 16:43:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b3c9e045d417df46fe280c152c347ff2 (2 x RemcosRAT)
ssdeep 12288:VUlsfhvpESpJSvqhk5QGCpglwBkVvflNHqp+2vSb:VNZZJSChk5rYkxUs
Threatray 788 similar samples on MalwareBazaar
TLSH 33156C67B39584F3C0625A78CC1797A4AC27BF113D3498867FE13F5E6E7A2813826193
Reporter nbd33
Tags:COVID-19 RemcosRAT scr

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe d661d0e5f0c691ce7a9602857de9d47e75802967d4375d6e9e01c0d7178b7f7f

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryExA
kernel32.dll::LoadLibraryA
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoA
kernel32.dll::GetDiskFreeSpaceA
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::FindFirstFileA
version.dll::GetFileVersionInfoSizeA
version.dll::GetFileVersionInfoA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI Actionsuser32.dll::ActivateKeyboardLayout
user32.dll::CreateMenu
user32.dll::FindWindowA
user32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments



Avatar
John F commented on 2020-04-30 17:47:32 UTC

Malicious Windows PE32 Executable - Dropper for Remcos