MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e24b10a3f7f12140bc0662b3b03ef80e8bf939d166bb0194f9b2f1a832db67bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: e24b10a3f7f12140bc0662b3b03ef80e8bf939d166bb0194f9b2f1a832db67bb
SHA3-384 hash: bd0536fe2769ba067c888082291f24a40b8a7afc96430ef8c3e66a5755bbb6b5adcd1bac79083d30294f24b486261d39
SHA1 hash: 3a4821e3bfd4358845f930127ebccc8a8b0160e1
MD5 hash: 29c12408683f836d1df323740733eaeb
humanhash: louisiana-beer-spring-coffee
File name:Returned Payment.gz
Download: download sample
Signature RemcosRAT
File size:440'700 bytes
First seen:2020-10-19 09:59:42 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:DAIlSXGuGcNGUOwgsAo29P3OBdEd0j9/kIg0Zi1qBPb9iBHO+JT:pkXGuGcNA1K29/Ofj9cN+i1iPb9iBHH
TLSH 229423974090E194D9BA853C53A28F71F0DA3B4A11970C9D594FE3FACB8348EF89ED94
Reporter abuse_ch
Tags:gz nVpn RAT RemcosRAT


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: yandex.com
Sending IP: 37.49.225.133
From: stoneadamss@yandex.com
Subject: RETURNED PAYMENT
Attachment: Returned Payment.gz (contains "Returned Payment.exe")

RemcosRAT C2:
185.140.53.192:1011

Hosted on nVpn:

% Information related to '185.140.53.0 - 185.140.53.255'

% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'

inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-BE
country: BE
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-10-02T20:59:33Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-19 05:36:40 UTC
AV detection:
4 of 48 (8.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

gz e24b10a3f7f12140bc0662b3b03ef80e8bf939d166bb0194f9b2f1a832db67bb

(this sample)

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments