MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d9165452d3a756f74bdc02fdc8477460abe31bcfa850f2211588e10dd0b1e084. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 9
| SHA256 hash: | d9165452d3a756f74bdc02fdc8477460abe31bcfa850f2211588e10dd0b1e084 |
|---|---|
| SHA3-384 hash: | e7b36d417ecb7a72899d4d4834b24ea4b1ff2228607e0f417ba7075884cc5b5ec6df00f1daaac6aa872f0d9478f11927 |
| SHA1 hash: | a193808381174ce1b46f86ea4e768926f75f6347 |
| MD5 hash: | d5018dc7250488f8b343d9df033ad608 |
| humanhash: | burger-whiskey-quiet-lactose |
| File name: | Kerenl.sfx.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 6'015'793 bytes |
| First seen: | 2021-01-12 12:42:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 98304:qyBQemGUVgyUPFdQkpHbDoapqWXEz6sLuEC3zw2fsLqzXfT0LuqbOb:VBxmGUVgfPzlIaKz6quz7ULqzvTDqbOb |
| Threatray | 416 similar samples on MalwareBazaar |
| TLSH | 67563302F6C46172D5228D3A3A2A57411D7A78345B2ACF9F33785A6E57B04C27733BB2 |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Kerenl.sfx.exe
Verdict:
Malicious activity
Analysis date:
2021-01-12 12:45:31 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Launching a process
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Sending a UDP request
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Moving a recently created file
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Drops executable to a common third party application directory
Hijacks the control flow in another process
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Malrep
Status:
Suspicious
First seen:
2021-01-12 12:43:04 UTC
AV detection:
8 of 29 (27.59%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 406 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
Blocklisted process makes network request
Remcos
Malware Config
C2 Extraction:
5.45.87.29:8000
Unpacked files
SH256 hash:
f0d95ae98875073c08ae114fc036b823d0890f7f5ae0fc34287ac89baf1b7c6f
MD5 hash:
b903b86fc5f15786b6ca8dba67ffffff
SHA1 hash:
02ee7184c1eaf5d4809220d0cfb37b16dc2aaec9
SH256 hash:
48e691a7b1876c18b4395ddaa6b2b918bf31695d9a3d725fbef525e5e680ffea
MD5 hash:
4c67c90cb15063825201326bbf02f6dc
SHA1 hash:
19469cc4dfa30194b781cd1b57ec1b69ce8d9c50
SH256 hash:
8cd4d81216323fe9bbe47bf35615c4e939d758416bc77022683deed138707bbb
MD5 hash:
416405818b92551c4d6c5be7a709650a
SHA1 hash:
2f5a0ae447d68ad7266017a1e0afbc25f6223755
SH256 hash:
13335f978924f3f1cb0b168657f91da8ea1fe3a3eac94d6cf76aef76eb744d00
MD5 hash:
96b5ee577f0c88c263f3882a9c95f913
SHA1 hash:
391948860187cce8312280083b5d282031122114
SH256 hash:
d1a23dfde9e03f428fd8aa67403fe23c8bfc1ec1c842d4225ed539de100a955a
MD5 hash:
b4018ae1603b169a9772944fbe8afd58
SHA1 hash:
60ece7e7e19686dc5895ce15791045414385aee0
SH256 hash:
286322be135ecc367c5dec481af7ee304095d36b0c67da9e7c0b536f1a216d6d
MD5 hash:
a6f435fc9ea148198e4c148f1e199689
SHA1 hash:
65b1d96ffad0e1ed5a70d2e6d26e9b3ca7927bb0
SH256 hash:
368f9b028ef1a0c1bfe666a690f939f3ca96955a1dd0b96026e2cdf3550ad219
MD5 hash:
0741703395198ccc125cf855a10092d5
SHA1 hash:
87defdca7904270dcc4d0d472402e7958f7e94ef
SH256 hash:
eedbd862fb1218ff2ecc7e4de4a15eb3bf566bb2c5ab82554c6584f73fd54717
MD5 hash:
94d6ffc1b6176acf94ed04101f91a55f
SHA1 hash:
94cb4b8ebc202b0917354a2c8bd2d4d36f361574
SH256 hash:
d100ac15c4d3a5035844865c0b75bfc34d51cfc702fa897813fa86bb819b7170
MD5 hash:
891c14b63a738beb61558f3362445bb6
SHA1 hash:
a4fc5497521b40f941f3fa747a3c984fc15121e2
SH256 hash:
4a72248ff9a23bbcac761ab301fd29cc097af94e3a5a56906dbf218c0da5dbe1
MD5 hash:
4bf44f454e736200d60a2832f0e34303
SHA1 hash:
bb49d3d5ef85eb75c1aa19c64e4e4c4f534067c0
SH256 hash:
6c92dd9d5cc7f671660d6e911f1925b117b5e483d5e70dd0c80ffaa3037fd8f5
MD5 hash:
629108a7b9545aa73c6397c287429b8b
SHA1 hash:
cb27ee8b776daeeb139752b0c4c9de4cabfa56de
SH256 hash:
1b0b2a0e4ee536c9a24aed04ae1a9676f6eec98c55597309b137282fafb4c0e5
MD5 hash:
e375a4301042af325456fb60b662c1e7
SHA1 hash:
e6da6bba62dd72617e7a73216ce9d3c4fe2746fe
SH256 hash:
d21e50dc60d86c8dd40b1232e4fa55cdbd993bcd03d1aff9c22b54db60f8aad3
MD5 hash:
07d00ce73b55d7fc92481f1e5f066793
SHA1 hash:
fa48a9711cf73ff4e784732b81ef046de177277e
SH256 hash:
c7fbdc61eb62c05e40295617e2db75877672931f751a770d2629e6eab6075f2c
MD5 hash:
abf6c724b20844d5b0073988a58faf1e
SHA1 hash:
7a8269d5b2ae623f8148ce9863f48f7e12ce036b
SH256 hash:
d9165452d3a756f74bdc02fdc8477460abe31bcfa850f2211588e10dd0b1e084
MD5 hash:
d5018dc7250488f8b343d9df033ad608
SHA1 hash:
a193808381174ce1b46f86ea4e768926f75f6347
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Backdoor
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.