MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee0e4e3198fd8942c1241f276857745823901fbbdd73b6827517998e17f91e09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: ee0e4e3198fd8942c1241f276857745823901fbbdd73b6827517998e17f91e09
SHA3-384 hash: 8d57d5dd027e2163ccac1598c671067be0a4752c8623f30fdd9954afc6387a200e0494699895f30293aff40b1a2651dc
SHA1 hash: bbbc9e19d221472af3eff1cdcb7dcb4fcb839d96
MD5 hash: 8d2a73380ca5c54346f8413d164ec580
humanhash: delaware-solar-mississippi-mirror
File name:rSparePartLists.exe
Download: download sample
Signature RemcosRAT
File size:650'507 bytes
First seen:2026-05-05 00:00:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 573bb7b41bc641bd95c0f5eec13c233b (38 x GuLoader, 24 x RemcosRAT, 16 x VIPKeylogger)
ssdeep 12288:dbkkX8dPhrWT+pTJkdS5k5BrF5gnEX3C3fZyi4aAwlJNB9:dbjXQRGEkqk55Feny3Cfxlfz
TLSH T130D4231033A0DCA7D36016B0DC634ABD5FE6BC7521B4531B73A0BAA93C77A45F91C26A
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon f0f0f4cab8d0f070 (2 x RemcosRAT)
Reporter FXOLabs
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
BR BR
Vendor Threat Intelligence
Gathering data
Malware family:
ID:
1
File name:
exe
Verdict:
Malicious activity
Analysis date:
2026-05-05 00:02:07 UTC
Tags:
rat remcos auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file
Delayed reading of the file
Searching for the window
Creating a file in the %temp% subdirectories
Restart of the analyzed sample
Result
Gathering data
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-05-04T17:11:00Z UTC
Last seen:
2026-05-04T20:45:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2026-05-04 23:24:34 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
17 of 36 (47.22%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost discovery persistence rat
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Contacts third-party web service commonly abused for C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Family: Remcos
Malware Config
C2 Extraction:
104.168.5.25:2404
104.168.5.25:5000
Unpacked files
SH256 hash:
ee0e4e3198fd8942c1241f276857745823901fbbdd73b6827517998e17f91e09
MD5 hash:
8d2a73380ca5c54346f8413d164ec580
SHA1 hash:
bbbc9e19d221472af3eff1cdcb7dcb4fcb839d96
SH256 hash:
8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c
MD5 hash:
9b38a1b07a0ebc5c7e59e63346ecc2db
SHA1 hash:
97332a2ffcf12a3e3f27e7c05213b5d7faa13735
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe ee0e4e3198fd8942c1241f276857745823901fbbdd73b6827517998e17f91e09

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments