MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed5f392d0095487edd0f112db6a14bbd3e9dc13454e63bf17bb0816d15e93f31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: ed5f392d0095487edd0f112db6a14bbd3e9dc13454e63bf17bb0816d15e93f31
SHA3-384 hash: 8d47b51288f9cf25b1020df6e02aad0bd073af00fb940d4419e54fd18891715c32dea722f65da4f2bc4621256eca6bae
SHA1 hash: 65ae8b330c8da3f7c0699ea054cdcc857087bd38
MD5 hash: d450c0d6afa6a22fc9fc53780bcc628b
humanhash: angel-avocado-cup-stream
File name:Payment Advice-BCS_ECS9522023032900460039_16922_952.exe
Download: download sample
Signature RemcosRAT
File size:1'062'400 bytes
First seen:2023-12-07 07:40:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'454 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:zy2iNpukyFWjrH66dn1uoLeyFfyu0AHyJy/bppvmT6TQ/lEtYyVgh2eV:G1XukRjr5pcobFJHxr+NNos
Threatray 3'131 similar samples on MalwareBazaar
TLSH T1B835BFD46AD6CBC0C037B170F049C6F2C3D2152AE099DBE1389B198AA1D2E555CFA9FD
TrID 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.1% (.SCR) Windows screen saver (13097/50/3)
8.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b1b1b17964989c06 (31 x SnakeKeylogger, 4 x AgentTesla, 3 x XWorm)
Reporter abuse_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
322
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Payment Advice-BCS_ECS9522023032900460039_16922_952.exe
Verdict:
Malicious activity
Analysis date:
2023-12-07 07:52:22 UTC
Tags:
remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a process with a hidden window
Launching a process
Restart of the analyzed sample
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, zgRAT
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to modify clipboard data
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal ftp login credentials
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1355228 Sample: Payment_Advice-BCS_ECS95220... Startdate: 07/12/2023 Architecture: WINDOWS Score: 100 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for URL or domain 2->50 52 14 other signatures 2->52 7 XOXpOFSvB.exe 5 2->7         started        10 Payment_Advice-BCS_ECS9522023032900460039_16922_952.exe 7 2->10         started        process3 file4 56 Multi AV Scanner detection for dropped file 7->56 58 Contains functionality to bypass UAC (CMSTPLUA) 7->58 60 Contains functionalty to change the wallpaper 7->60 68 6 other signatures 7->68 13 schtasks.exe 1 7->13         started        15 XOXpOFSvB.exe 7->15         started        38 C:\Users\user\AppData\Roaming\XOXpOFSvB.exe, PE32 10->38 dropped 40 C:\Users\user\AppData\Local\...\tmpE105.tmp, XML 10->40 dropped 62 Uses schtasks.exe or at.exe to add and modify task schedules 10->62 64 Adds a directory exclusion to Windows Defender 10->64 66 Injects a PE file into a foreign processes 10->66 17 powershell.exe 23 10->17         started        21 Payment_Advice-BCS_ECS9522023032900460039_16922_952.exe 2 10->21         started        24 powershell.exe 23 10->24         started        26 schtasks.exe 1 10->26         started        signatures5 process6 dnsIp7 28 conhost.exe 13->28         started        36 C:\...\__PSScriptPolicyTest_alftptxg.lta.ps1, ASCII 17->36 dropped 54 Tries to harvest and steal ftp login credentials 17->54 30 conhost.exe 17->30         started        42 45.128.234.54, 49709, 49716, 49718 RACKTECHRU United Kingdom 21->42 44 127.0.0.1 unknown unknown 21->44 32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        file8 signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.SnakeLogger
Status:
Malicious
First seen:
2023-04-07 08:32:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
27 of 37 (72.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos family:zgrat botnet:remotehost rat
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Detect ZGRat V1
Remcos
ZGRat
Malware Config
C2 Extraction:
127.0.0.1:56932
45.128.234.54:56932
Unpacked files
SH256 hash:
78263b569d4f9ed2016bd9c29718f62e55413cd4ca0106295c0443fafdc085d5
MD5 hash:
aef59f95e1a844e2551c8f3b4ef5a3b8
SHA1 hash:
d93e7ad3d586dfdee6b1c99db9237760671dd928
SH256 hash:
3c507afadbb1c31a9ebdd24baac5739d47576159e01c5e84f973c951885100aa
MD5 hash:
e79bf0e7e9d52d398e0b23b352394c68
SHA1 hash:
682325763a0ec77e0fd475ea3a4021b4651eceac
Detections:
INDICATOR_EXE_Packed_SmartAssembly
SH256 hash:
a9324b87639fbe6844f6add9fd49e9e6dcfd6d472beddaadf2056e1623a9e773
MD5 hash:
d156609c1dfab86c24f9f0934488d285
SHA1 hash:
54180cc33f0817d5292b1735c9aea9abc1e54145
Detections:
Remcos win_remcos_w0 win_remcos_auto malware_windows_remcos_rat INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM win_remcos_rat_unpacked
SH256 hash:
31ab5675c1aebcbaf5323147418bdd8a72c70c851cd5cb269f0e9d4af0540c09
MD5 hash:
6fe7ed436dc4c6afc6f37f8d5a3c2d61
SHA1 hash:
49e6ccc593015b26639b9bc4ee8e0679028c15a2
SH256 hash:
d02a501f1f14a2f6b4ff9aee1486596f5e5bb9bd74eaf79e8e00bb6dd5c56669
MD5 hash:
5f9680049aa2f108e93a7e5723e5b85f
SHA1 hash:
05dbe6d6b520bcfa7e2620dc5dd2d0895988fba8
SH256 hash:
ed5f392d0095487edd0f112db6a14bbd3e9dc13454e63bf17bb0816d15e93f31
MD5 hash:
d450c0d6afa6a22fc9fc53780bcc628b
SHA1 hash:
65ae8b330c8da3f7c0699ea054cdcc857087bd38
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:Dotnet_Hidden_Executables_Detect
Author:Mehmet Ali Kerimoglu (@CYB3RMX)
Description:This rule detects hidden PE file presence.
Reference:https://github.com/CYB3RMX/Qu1cksc0pe
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe ed5f392d0095487edd0f112db6a14bbd3e9dc13454e63bf17bb0816d15e93f31

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments