MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dbc1b999e36f9367bc87eb6f04929a7c2518c390a19d8f51d4ae3ebac9dea9c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 14
| SHA256 hash: | dbc1b999e36f9367bc87eb6f04929a7c2518c390a19d8f51d4ae3ebac9dea9c8 |
|---|---|
| SHA3-384 hash: | 004b2a035450e0fa1913c757e21ae2aa2f6489eec9939e559b78ea30c3a3b2a0e6eb267c71f2e6d480cbdc97db624dbb |
| SHA1 hash: | e58a1157f6d9b71e0e7e2e42f4ee035dacc93e03 |
| MD5 hash: | f51a8a543b69becf9946c5f022a78b2b |
| humanhash: | fanta-south-mirror-mexico |
| File name: | SecuriteInfo.com.Variant.Zusy.436337.11040.28032 |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 1'050'624 bytes |
| First seen: | 2022-08-30 09:46:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 45e97a00ecbd587477169510db95872b (5 x RemcosRAT, 3 x ModiLoader, 2 x FormBook) |
| ssdeep | 24576:DJLADyaLg23PYHKiMtkku4nzSrmdN40JIyE9WDvk:DJEDfg23w4tkku4nzSrmdmWbaW |
| Threatray | 5 similar samples on MalwareBazaar |
| TLSH | T14B25B0E3F7D18B33D1631AB9CE1B5358992ABE201E20548A27F51D4CDF3879078396A7 |
| TrID | 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61) 4.2% (.EXE) InstallShield setup (43053/19/16) 1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4) 1.2% (.SCR) Windows screen saver (13101/52/3) |
| File icon (PE): | |
| dhash icon | eef2eed69696eabe (10 x RemcosRAT, 8 x ModiLoader, 6 x Formbook) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Variant.Zusy.436337.11040.28032
Verdict:
Suspicious activity
Analysis date:
2022-08-30 09:51:33 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Searching for the window
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
greyware keylogger
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
DBatLoader, Remcos
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-08-30 09:47:14 UTC
File Type:
PE (Exe)
Extracted files:
91
AV detection:
13 of 40 (32.50%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
Result
Malware family:
modiloader
Score:
10/10
Tags:
family:modiloader trojan
Behaviour
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
dd98aba7a667aa34e7883503f23b3f8efff8b4b56e22f753a72b37c14a3127b3
MD5 hash:
dfd91793d4bb73bb475e0acecf94c9f7
SHA1 hash:
f5ec6cb9eeae23da65a478b614b9b74370878670
Detections:
win_dbatloader_g1
Parent samples :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 hash:
dbc1b999e36f9367bc87eb6f04929a7c2518c390a19d8f51d4ae3ebac9dea9c8
MD5 hash:
f51a8a543b69becf9946c5f022a78b2b
SHA1 hash:
e58a1157f6d9b71e0e7e2e42f4ee035dacc93e03
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.