MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2f7e2ca58c527be8332bcea02a3e593eda09429bb30ce5ced6ef26724388f01. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RevCodeRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: e2f7e2ca58c527be8332bcea02a3e593eda09429bb30ce5ced6ef26724388f01
SHA3-384 hash: cb00052cfacfeced34b9faea93f503a9b84dbaa13d3bc3650e23c2dee7d5c5cdebaf8303bc2f21f212cbe2856de575a6
SHA1 hash: b9cdda7ff0a20b1e0f8c005f009162ea59d4dabf
MD5 hash: 57927a649b95ccc4cb8374ce308eca41
humanhash: echo-december-utah-mars
File name:tax-relief.exe
Download: download sample
Signature RevCodeRAT
File size:560'640 bytes
First seen:2020-12-08 16:43:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 6144:5Emkk3GRn3azbhlubJi6pEK3o1WHJMUHqzEuxJ+EU1c98WIFHSHF7QQEE60:5Zkk3g3avhSDuiouS9zE3E6cIFHvQ56
Threatray 44 similar samples on MalwareBazaar
TLSH 48C4EF63AEBAEE73DBF475FF105475142E6D4E918DE2788A705CB144FEB3806C890982
Reporter abuse_ch
Tags:exe IRS RAT RevCodeRAT


Avatar
abuse_ch
Malspam distributing RevCodeRAT:

HELO: englam.com.sg
Sending IP: 103.11.189.57
From: IRS <noreply@taxpayers.com>
Subject: TAX RELIEF UPDATES
Attachment: tax-relief.pdf.z (contains "tax-relief.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
200
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
tax-relief.exe
Verdict:
Suspicious activity
Analysis date:
2020-12-08 17:33:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Creating a process from a recently created file
Launching a process
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
WebMonitor RAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Potentially malicious time measurement code found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM_3
Yara detected WebMonitor RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 328214 Sample: tax-relief.exe Startdate: 08/12/2020 Architecture: WINDOWS Score: 100 42 g.msn.com 2->42 54 Antivirus / Scanner detection for submitted sample 2->54 56 Yara detected WebMonitor RAT 2->56 58 Yara detected AntiVM_3 2->58 60 2 other signatures 2->60 8 tax-relief.exe 4 2->8         started        11 HWMonitor.exe 3 2->11         started        14 HWMonitor.exe 2 2->14         started        signatures3 process4 file5 28 C:\Users\user\AppData\Roaming\HWMonitor.exe, PE32 8->28 dropped 30 C:\Users\user\AppData\...\tax-relief.exe.log, ASCII 8->30 dropped 16 RegAsm.exe 2 13 8->16         started        20 powershell.exe 1 18 8->20         started        62 Antivirus detection for dropped file 11->62 64 Multi AV Scanner detection for dropped file 11->64 66 Machine Learning detection for dropped file 11->66 22 RegAsm.exe 11->22         started        24 RegAsm.exe 14->24         started        signatures6 process7 dnsIp8 32 ntp.se 194.58.200.20, 123, 50011, 50701 NTP-SEAnycastedNTPservicesfromNetnodIXPsSE Sweden 16->32 34 45.153.186.90 MVPShttpswwwmvpsnetEU Bulgaria 16->34 40 6 other IPs or domains 16->40 44 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->44 46 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->46 48 Creates autostart registry keys with suspicious names 16->48 52 6 other signatures 16->52 50 Creates multiple autostart registry keys 20->50 26 conhost.exe 20->26         started        36 sdns.se 22->36 38 467d1c38650f4868e640f66d950a22d8.se 22->38 signatures9 process10
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2020-12-08 16:44:13 UTC
AV detection:
26 of 48 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Unpacked files
SH256 hash:
e2f7e2ca58c527be8332bcea02a3e593eda09429bb30ce5ced6ef26724388f01
MD5 hash:
57927a649b95ccc4cb8374ce308eca41
SHA1 hash:
b9cdda7ff0a20b1e0f8c005f009162ea59d4dabf
SH256 hash:
43282af1e6d55078f81dfb0f9cc61ad2d26ed479d2a73e8473783e41c6e2b71e
MD5 hash:
f9f27b6827289e06b8cd1c2a6dc51964
SHA1 hash:
cbc55ea515c37c2604f62d53de47f5f987c69145
SH256 hash:
c33e111ac29cbb9185ef65496cebb7e59ddaa6e444a7aa96b432b6930f87770c
MD5 hash:
b35dc40cb97ff379aaa00aeb377d3b09
SHA1 hash:
42dd31e3eb63c002044f7d66ebd97f8bf450ed6a
Detections:
win_webmonitor_w0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_webmonitor_w0
Author:James_inthe_box
Description:Revcode RAT
Reference:ee1b9659f2193896ce3469b5f90b82af3caffcba428e8524be5a9fdf391d8dd8

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RevCodeRAT

Executable exe e2f7e2ca58c527be8332bcea02a3e593eda09429bb30ce5ced6ef26724388f01

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments