MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ebbc6f882c469db06196cbeea3ef7b62899229ef1f89234ef3ace2f83ce2b557. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 7 File information Comments

SHA256 hash: ebbc6f882c469db06196cbeea3ef7b62899229ef1f89234ef3ace2f83ce2b557
SHA3-384 hash: a3b3cd7d40d1bced0d669b755ea4a8f5312656ecc9b5eee3a122d7a582ececa6c43a3a7bdd08bb808952253dde989a02
SHA1 hash: 6eadb4c0a2ecf54a8de7ff4710fdfc91492f3f6b
MD5 hash: a2dac22fc7ce238e119ecf3151e48582
humanhash: winter-may-chicken-lima
File name:Notice to submit_pdf.exe
Download: download sample
Signature RemcosRAT
File size:1'294'723 bytes
First seen:2021-07-08 13:44:33 UTC
Last seen:2021-07-12 13:15:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:bAOcZXGN8TpRrVxRQLonI8FnpHhr7qEkdbiG2K2fpl:9SDRQLyrppHhadbcHfpl
Threatray 643 similar samples on MalwareBazaar
TLSH T1EE55DF13B341C5BAD4690730C5639BF16EB6AD30DAA2861B6BA03D2F7D323507E25F91
Reporter Anonymous
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Notice to submit_pdf.exe
Verdict:
Malicious activity
Analysis date:
2021-07-08 13:46:05 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Detected Remcos RAT
Drops PE files with a suspicious file extension
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: Suspicious Process Start Without DLL
Sigma detected: WScript or CScript Dropper
Writes to foreign memory regions
Yara detected AntiVM autoit script
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 445920 Sample: Notice to submit_pdf.exe Startdate: 08/07/2021 Architecture: WINDOWS Score: 100 32 cato.fingusti.club 2->32 38 Multi AV Scanner detection for domain / URL 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 9 other signatures 2->44 10 Notice to submit_pdf.exe 35 2->10         started        13 jiql.pif 2->13         started        signatures3 process4 file5 30 C:\Users\user\AppData\Roaming\...\jiql.pif, PE32 10->30 dropped 15 jiql.pif 4 3 10->15         started        18 RegSvcs.exe 13->18         started        process6 signatures7 60 Multi AV Scanner detection for dropped file 15->60 20 wscript.exe 1 15->20         started        process8 dnsIp9 34 192.168.2.1 unknown unknown 20->34 23 jiql.pif 20->23         started        process10 signatures11 46 Writes to foreign memory regions 23->46 48 Allocates memory in foreign processes 23->48 50 Injects a PE file into a foreign processes 23->50 26 RegSvcs.exe 2 3 23->26         started        process12 dnsIp13 36 cato.fingusti.club 79.134.225.92, 49751, 49752, 49753 FINK-TELECOM-SERVICESCH Switzerland 26->36 52 Contains functionalty to change the wallpaper 26->52 54 Contains functionality to steal Chrome passwords or cookies 26->54 56 Contains functionality to capture and log keystrokes 26->56 58 2 other signatures 26->58 signatures14
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2021-07-08 13:45:05 UTC
AV detection:
26 of 46 (56.52%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:nanocore family:remcos botnet:newyear keylogger persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
NanoCore
Remcos
Malware Config
C2 Extraction:
cato.fingusti.club:6609
Unpacked files
SH256 hash:
355af38916b994d6bbb952d4fa855cd7f85e4b61523e9f24aea5f491202333e2
MD5 hash:
47d2d8a59de04ba87f0ee6009aec0276
SHA1 hash:
8226b17ab7fb0f2d9fc3a8ef8b92b24b915e5e79
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
d1b6ebb2a35b2359c14f276c3bda64ff5e95d206fb98a3cb99c5986d142c52d2
MD5 hash:
a203f7f298298a0b765f591663d79da3
SHA1 hash:
9ba50ed46cd4bb635cb68a1b391f5f0fe4e2b08d
SH256 hash:
ebbc6f882c469db06196cbeea3ef7b62899229ef1f89234ef3ace2f83ce2b557
MD5 hash:
a2dac22fc7ce238e119ecf3151e48582
SHA1 hash:
6eadb4c0a2ecf54a8de7ff4710fdfc91492f3f6b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments