MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f07afe33dfd7bc0e3ba123cbf4b0bd354f1e222cc64a3ec1f7ad7e8a7b6b956b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: f07afe33dfd7bc0e3ba123cbf4b0bd354f1e222cc64a3ec1f7ad7e8a7b6b956b
SHA3-384 hash: c72650a57946c71f8f8a8056bfe7c8cba9e8a93d78d90044b3ae427d160373ceedc8429557f89604718c16c573722d6f
SHA1 hash: e5420d019b1c6ab4387cb752ac38de625ae38ab6
MD5 hash: 0b73ad75c7a0d21c16a40a034be2e1e4
humanhash: yellow-sad-connecticut-equal
File name:img - Nowe zapytanie i specyfikacja 1800622907641053.vbs
Download: download sample
Signature RemcosRAT
File size:464'827 bytes
First seen:2024-02-20 16:34:41 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 6144:yBLJTm9IXemXybzb/GBtHgiTJRn5TGFWPl0wluh9tOxDOkkilTIy1:M+mXybzb/mgMVlPl0wluh9tOxmilTb1
TLSH T181A44D731107BC9A2DBF1E88F0143A615C947DD3A761D29CFACC05AE63EA294DE5C8B4
Reporter Anonymous
Tags:RemcosRAT vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
PL PL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dropper obfuscated remcos
Result
Verdict:
MALICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
Remcos, PureLog Stealer
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found malware configuration
Installs a global keyboard hook
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Potential malicious VBS script found (has network functionality)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Remcos
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses ipconfig to lookup or modify the Windows network settings
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1395476 Sample: img - Nowe zapytanie i spec... Startdate: 20/02/2024 Architecture: WINDOWS Score: 100 80 igw.myfirewall.org 2->80 82 zenger-industry.de 2->82 84 geoplugin.net 2->84 90 Found malware configuration 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus detection for URL or domain 2->94 96 12 other signatures 2->96 9 wscript.exe 2 2->9         started        13 auiugejhvhgchdhgc.exe 14 5 2->13         started        15 auiugejhvhgchdhgc.exe 2->15         started        signatures3 process4 file5 76 C:\Users\user\AppData\Local\Temp\x.exe, PE32 9->76 dropped 116 Benign windows process drops PE files 9->116 118 VBScript performs obfuscated calls to suspicious functions 9->118 120 Windows Scripting host queries suspicious COM object (likely to drop second stage) 9->120 17 x.exe 16 5 9->17         started        122 Contains functionality to bypass UAC (CMSTPLUA) 13->122 124 Contains functionalty to change the wallpaper 13->124 126 Machine Learning detection for dropped file 13->126 128 4 other signatures 13->128 22 cmd.exe 13->22         started        24 cmd.exe 13->24         started        26 auiugejhvhgchdhgc.exe 13->26         started        32 2 other processes 13->32 28 cmd.exe 15->28         started        30 cmd.exe 15->30         started        signatures6 process7 dnsIp8 78 zenger-industry.de 104.21.1.178, 443, 49705, 49716 CLOUDFLARENETUS United States 17->78 72 C:\Users\user\...\auiugejhvhgchdhgc.exe, PE32 17->72 dropped 98 Tries to steal Mail credentials (via file registry) 17->98 100 Machine Learning detection for dropped file 17->100 102 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 17->102 34 x.exe 3 16 17->34         started        39 cmd.exe 1 17->39         started        41 cmd.exe 1 17->41         started        43 x.exe 17->43         started        45 conhost.exe 22->45         started        47 ipconfig.exe 22->47         started        49 2 other processes 24->49 51 2 other processes 28->51 53 2 other processes 30->53 file9 signatures10 process11 dnsIp12 86 igw.myfirewall.org 103.35.191.158, 2404, 49713, 49714 VECTANTARTERIANetworksCorporationJP Japan 34->86 88 geoplugin.net 178.237.33.50, 49715, 80 ATOM86-ASATOM86NL Netherlands 34->88 74 C:\ProgramData\remcos\logs.dat, data 34->74 dropped 104 Maps a DLL or memory area into another process 34->104 106 Installs a global keyboard hook 34->106 55 x.exe 1 34->55         started        58 x.exe 1 34->58         started        60 x.exe 2 34->60         started        62 x.exe 34->62         started        108 Uses ipconfig to lookup or modify the Windows network settings 39->108 64 conhost.exe 39->64         started        66 ipconfig.exe 1 39->66         started        68 conhost.exe 41->68         started        70 ipconfig.exe 1 41->70         started        file13 signatures14 process15 signatures16 110 Tries to steal Instant Messenger accounts or passwords 55->110 112 Tries to steal Mail credentials (via file / registry access) 55->112 114 Tries to harvest and steal browser information (history, passwords, etc) 58->114
Threat name:
Script-WScript.Trojan.Valyria
Status:
Malicious
First seen:
2024-02-20 16:35:08 UTC
File Type:
Text (VBS)
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:remcos family:zgrat botnet:fresh collection persistence rat spyware stealer
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Detect ZGRat V1
Remcos
ZGRat
Malware Config
C2 Extraction:
igw.myfirewall.org:2404
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments