MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed925501e749cdc073143ed948ec8a93c6b6a4b76304d9c6a76c6faabc8d048e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: ed925501e749cdc073143ed948ec8a93c6b6a4b76304d9c6a76c6faabc8d048e
SHA3-384 hash: 62ff266896e8f3c8b71d6e9fbebc05fe88e86936f2b636f08d98404ac9123c8d89f46bea28c90689dbba106d837d58fc
SHA1 hash: 7c66dcd951d4795fc8aae773f55aec385cfd1c7e
MD5 hash: faeeeb063ff4d8bbfff9a1fae1b71ca8
humanhash: mexico-eleven-bulldog-quebec
File name:goodwill.hta
Download: download sample
Signature RemcosRAT
File size:46'681 bytes
First seen:2026-03-10 10:06:29 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 192:EuQrPCqIAuA7dRT0BYA34Pukzpxu58TdD4ubux:EVrPCqIA9df5Td4Wm
TLSH T180231A9A1ACCE7F5C09145F05DE5A90E0C080F2FBEAC5A39F91C56C6832226B17B5A1E
Magika html
Reporter proxylife
Tags:hta RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
DK DK
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
94.9%
Tags:
phishing xtreme shell sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://96.44.159.218/220/seethebesttimeforeverythingtolearn.js
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell
Verdict:
Malicious
File Type:
html
Detections:
HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.HTA.SAgent.gen
Gathering data
Verdict:
Malicious
Threat:
Trojan-Downloader.Script.SAgent
Threat name:
Win32.Trojan.Electryon
Status:
Malicious
First seen:
2026-03-10 10:07:20 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:skylnk collection discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Badlisted process makes network request
Detected Nirsoft tools
Process spawned unexpected child process
Remcos
Remcos family
Malware Config
C2 Extraction:
goodpeopleswhitbrigheartwinthisindustryi.duckdns.org:14646
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments