MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1eb708f47303b831f6eb0ddc846e21782e8f727dcb0088fcb997c3bf0d4dbd3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments 1

SHA256 hash: e1eb708f47303b831f6eb0ddc846e21782e8f727dcb0088fcb997c3bf0d4dbd3
SHA3-384 hash: af57abd063906866fdb629c95fa4421209b1c90477357d92fafbf47b2ce8e7f15fbddadb8f7fc7a1367f5bbca46fb3dd
SHA1 hash: bcc954d5ce331788078014e4228d45708b241260
MD5 hash: f5c34502dc6bfa6a3422017f506d333c
humanhash: edward-island-fruit-echo
File name:f5c34502dc6bfa6a3422017f506d333c
Download: download sample
Signature RemcosRAT
File size:1'040'896 bytes
First seen:2022-09-10 01:06:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:04444+yWQDTaaZdVbID9YNKIbTPO2MADn87SumJEVK87v4/yWjslSey4444:Dy5sAKiTPtn87jSLy4sY
Threatray 2'178 similar samples on MalwareBazaar
TLSH T12D2512FEBB68CE37D96D587DD412198282B72D51EA02DF9E7DE032EC6C773920102196
TrID 61.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.0% (.SCR) Windows screen saver (13101/52/3)
8.8% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
359
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
MMU.exe
Verdict:
Malicious activity
Analysis date:
2022-09-07 21:27:51 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
75%
Tags:
keylogger packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 700582 Sample: s7433VERKH.exe Startdate: 10/09/2022 Architecture: WINDOWS Score: 100 49 Multi AV Scanner detection for domain / URL 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Antivirus detection for dropped file 2->53 55 9 other signatures 2->55 10 s7433VERKH.exe 3 2->10         started        13 iys.exe 2 2->13         started        15 iys.exe 2 2->15         started        process3 file4 43 C:\Users\user\AppData\...\s7433VERKH.exe.log, ASCII 10->43 dropped 17 s7433VERKH.exe 4 4 10->17         started        20 iys.exe 13->20         started        22 iys.exe 15->22         started        process5 file6 37 C:\Users\user\AppData\Roaming\iys.exe, PE32 17->37 dropped 39 C:\Users\user\...\iys.exe:Zone.Identifier, ASCII 17->39 dropped 41 C:\Users\user\AppData\Local\...\install.vbs, data 17->41 dropped 24 wscript.exe 1 17->24         started        process7 process8 26 cmd.exe 1 24->26         started        process9 28 iys.exe 3 26->28         started        31 conhost.exe 26->31         started        signatures10 59 Multi AV Scanner detection for dropped file 28->59 61 Machine Learning detection for dropped file 28->61 33 iys.exe 2 15 28->33         started        process11 dnsIp12 45 maly22333.ddnsking.com 185.225.73.209, 3091, 49717 MAYAKBG Germany 33->45 47 geoplugin.net 178.237.33.50, 49718, 80 ATOM86-ASATOM86NL Netherlands 33->47 57 Installs a global keyboard hook 33->57 signatures13
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2022-09-07 14:26:57 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:malymoney persistence rat
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
maly22333.ddnsking.com:3091
Unpacked files
SH256 hash:
d65c481ad0b7b0d71bf11b5aaa45f6b43b61c67f058bc94b78252c95e0d51271
MD5 hash:
64b13932e9bfbd3e5b898e6d0ff31dfd
SHA1 hash:
e80b70e2d6745764846a82c5aadec9f48063ad3e
SH256 hash:
fbe93d5ad7e71987cca3e13458042cbae044e84c1748e9f82b5506448bbff275
MD5 hash:
44a889ce18674ed68ac2e39b38af3016
SHA1 hash:
9d7af279d62707c61cb2a0e9ce43ee476c8ff40e
SH256 hash:
beb417cc7253fde24081d9a5a93f1b179dbbd39c829bd427f7e620cec34ce19a
MD5 hash:
dcc224869c206fc6cf05d50b282f5b8f
SHA1 hash:
46178b9110360140d5220d33263d81993b755f74
SH256 hash:
e1eb708f47303b831f6eb0ddc846e21782e8f727dcb0088fcb997c3bf0d4dbd3
MD5 hash:
f5c34502dc6bfa6a3422017f506d333c
SHA1 hash:
bcc954d5ce331788078014e4228d45708b241260
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe e1eb708f47303b831f6eb0ddc846e21782e8f727dcb0088fcb997c3bf0d4dbd3

(this sample)

Comments



Avatar
zbet commented on 2022-09-10 01:06:38 UTC

url : hxxp://81.161.229.156/mmk.exe