MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed3025c977b3b86c1891364a05323b582336865698acf3252811da125ad00ea8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: ed3025c977b3b86c1891364a05323b582336865698acf3252811da125ad00ea8
SHA3-384 hash: 4b60f16307bcb493071d84865090e8ac2c56c00d5c1316c5a34a436542e77fb081810b13af3ee61dcff1dd38a9d6df92
SHA1 hash: 03bbfd63cd3b140a361a6266a971330800b7ed9c
MD5 hash: 6c1acc0260bb614438399218aee3f485
humanhash: carolina-october-coffee-texas
File name:Re Подтверждение заказа-5309,pdf.exe
Download: download sample
Signature RemcosRAT
File size:907'264 bytes
First seen:2021-08-04 12:40:50 UTC
Last seen:2021-08-04 14:24:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4de4e132825d8ff5881e7c510ae93609 (3 x RemcosRAT)
ssdeep 12288:jrmgDOXRVBMr+PIgdwke5XtICweJPcdGWctYScYjY65RnuZUjsCJb3:jrmgKXTMAdwke5uCBJ8GNtYCM6lA6
Threatray 344 similar samples on MalwareBazaar
TLSH T154154C12F753483EC2BE79BE689E5E6C582CAF551A03DB4A9B9E1C483E3835134190DF
dhash icon 2a156a6a49c8c8c8 (5 x RemcosRAT)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Re Подтверждение заказа-5309,pdf.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-04 07:19:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 459268 Sample: 5309,pdf.exe Startdate: 04/08/2021 Architecture: WINDOWS Score: 100 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 5 other signatures 2->55 6 5309,pdf.exe 1 19 2->6         started        11 Sbraybw.exe 16 2->11         started        13 Sbraybw.exe 16 2->13         started        process3 dnsIp4 25 q8utna.dm.files.1drv.com 6->25 27 onedrive.live.com 6->27 29 dm-files.fe.1drv.com 6->29 23 C:\Users\Public\Libraries\...\Sbraybw.exe, PE32 6->23 dropped 57 Writes to foreign memory regions 6->57 59 Creates a thread in another existing process (thread injection) 6->59 61 Injects a PE file into a foreign processes 6->61 15 DpiScaling.exe 2 6->15         started        31 q8utna.dm.files.1drv.com 11->31 35 2 other IPs or domains 11->35 63 Multi AV Scanner detection for dropped file 11->63 65 Allocates memory in foreign processes 11->65 19 secinit.exe 11->19         started        33 q8utna.dm.files.1drv.com 13->33 37 2 other IPs or domains 13->37 21 secinit.exe 13->21         started        file5 signatures6 process7 dnsIp8 39 thankyoulord4real.ddns.net 185.19.85.140, 3030, 49732 DATAWIRE-ASCH Switzerland 15->39 41 Contains functionality to steal Chrome passwords or cookies 15->41 43 Contains functionality to inject code into remote processes 15->43 45 Contains functionality to steal Firefox passwords or cookies 15->45 47 Delayed program exit found 19->47 signatures9
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2021-08-04 09:01:51 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
c873bd224bbf6f82aa169f079016ebdf7690b40a7db5dd8cfefd26404a9d50ca
MD5 hash:
d328f4ade4dd3cd77b3c055c6a7a7937
SHA1 hash:
5d2437502c20efaadd44d27bd5f2f748bdb48512
SH256 hash:
ed3025c977b3b86c1891364a05323b582336865698acf3252811da125ad00ea8
MD5 hash:
6c1acc0260bb614438399218aee3f485
SHA1 hash:
03bbfd63cd3b140a361a6266a971330800b7ed9c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe ed3025c977b3b86c1891364a05323b582336865698acf3252811da125ad00ea8

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments