MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e837e409e593eb440550d2dc1174b65045242229ee9e3614360b37018d05fa52. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e837e409e593eb440550d2dc1174b65045242229ee9e3614360b37018d05fa52
SHA3-384 hash: 392b146c192c88215596110912088bfcb016b503081f1bd59ffbdbd5fc855278ad173accfdb57ef2a1775d8022df2e89
SHA1 hash: 7dbfcb93c26ba1b4ca9ccfe9816a1b1d06b4d892
MD5 hash: 7c374afcd59467fc92eefe8d4d8a0e2b
humanhash: venus-table-east-comet
File name:SecuriteInfo.com.Variant.Jacard.195755.4770.29790
Download: download sample
Signature RemcosRAT
File size:772'608 bytes
First seen:2020-09-09 08:40:14 UTC
Last seen:2020-09-09 09:34:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f26380c2ff0132f633b3a4c3a7b78204 (1 x RemcosRAT)
ssdeep 12288:oBsTH6utCjH41Zl/aQITF50HKS3dMREuqGlKyZBsmFvE0V4:oU2c7CQSKqe8ewJE0V
Threatray 6 similar samples on MalwareBazaar
TLSH D1F46C33E2D15837C1732A38AC1B57A8A93ABE103E789C466BF51D4C5F3978178352A7
Reporter SecuriteInfoCom
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2020-09-09 06:44:00 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence trojan family:modiloader rat family:remcos
Behaviour
Script User-Agent
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
blazeblaze.ddns.net:10008
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe e837e409e593eb440550d2dc1174b65045242229ee9e3614360b37018d05fa52

(this sample)

  
Delivery method
Distributed via web download

Comments