MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 19


Intelligence 19 IOCs YARA 25 File information Comments 1

SHA256 hash: f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04
SHA3-384 hash: cf96dd7d5b722db049307a5fad2da8414306fcf211455f9d8a52a3b3a3445af91144952ab1d7c84a8637f9758bad4937
SHA1 hash: a01d2ceb1b9d0e002eb67a00fbac9238285dce85
MD5 hash: 411c2e3611e8ee701918cfe17399da79
humanhash: april-michigan-steak-cold
File name:411c2e3611e8ee701918cfe17399da79
Download: download sample
Signature RemcosRAT
File size:2'576'168 bytes
First seen:2024-03-11 10:35:39 UTC
Last seen:2024-03-11 12:39:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'665 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:YBO8QRm2I9bC9hY8PU5sevK7F6wd0HL5xRpMrpaKE9eFodKe/HT0:Y88QRmVluhnPyhyx30HlUpaKpodtHT0
Threatray 3'656 similar samples on MalwareBazaar
TLSH T148C5E082F4940179C7191A7BF8B648EE6370CCEE4AD3BA86E4702DD29FB7B34854154B
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
365
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04.exe
Verdict:
Malicious activity
Analysis date:
2024-03-11 10:38:43 UTC
Tags:
rat remcos remote evasion keylogger xworm ransomware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Restart of the analyzed sample
Creating a file
Enabling the 'hidden' option for recently created files
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, Chaos, PureLog Stealer, XWorm
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Delayed program exit found
Deletes shadow drive data (may be related to ransomware)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: Remcos
Sigma detected: Suspect Svchost Activity
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Chaos Ransomware
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1406504 Sample: m91Id3LELg.exe Startdate: 11/03/2024 Architecture: WINDOWS Score: 100 65 gamemodz.duckdns.org 2->65 67 ip-api.com 2->67 69 geoplugin.net 2->69 93 Snort IDS alert for network traffic 2->93 95 Multi AV Scanner detection for domain / URL 2->95 97 Found malware configuration 2->97 101 25 other signatures 2->101 11 m91Id3LELg.exe 3 2->11         started        15 m91Id3LELg.exe 2->15         started        17 m91Id3LELg.exe 2->17         started        19 6 other processes 2->19 signatures3 99 Uses dynamic DNS services 65->99 process4 file5 61 C:\Users\user\AppData\Local\...\sysupdate.exe, PE32 11->61 dropped 125 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->125 127 Injects a PE file into a foreign processes 11->127 129 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 11->129 21 sysupdate.exe 3 3 11->21         started        25 m91Id3LELg.exe 16 3 11->25         started        131 Multi AV Scanner detection for dropped file 15->131 28 sysupdate.exe 15->28         started        30 sysupdate.exe 15->30         started        32 m91Id3LELg.exe 15->32         started        34 m91Id3LELg.exe 15->34         started        36 sysupdate.exe 17->36         started        38 sysupdate.exe 17->38         started        40 m91Id3LELg.exe 17->40         started        signatures6 process7 dnsIp8 57 C:\ProgramData\sysupdate\sysupdate.exe, PE32 21->57 dropped 103 Antivirus detection for dropped file 21->103 105 Multi AV Scanner detection for dropped file 21->105 107 Contains functionality to bypass UAC (CMSTPLUA) 21->107 115 7 other signatures 21->115 42 sysupdate.exe 2 1 21->42         started        71 ip-api.com 208.95.112.1, 49733, 80 TUT-ASUS United States 25->71 59 C:\Users\user\AppData\...\m91Id3LELg.exe, PE32 25->59 dropped 109 Protects its processes via BreakOnTermination flag 25->109 111 Creates multiple autostart registry keys 25->111 113 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 25->113 file9 signatures10 process11 signatures12 117 Antivirus detection for dropped file 42->117 119 Multi AV Scanner detection for dropped file 42->119 121 Contains functionality to bypass UAC (CMSTPLUA) 42->121 123 7 other signatures 42->123 45 iexplore.exe 3 15 42->45         started        process13 dnsIp14 73 gamemodz.duckdns.org 45.128.96.133, 2404, 49729, 49730 XXLNETNL Germany 45->73 75 geoplugin.net 178.237.33.50, 49731, 49732, 80 ATOM86-ASATOM86NL Netherlands 45->75 63 C:\Users\user\AppData\Local\Temp\shout.exe, PE32 45->63 dropped 133 Deletes shadow drive data (may be related to ransomware) 45->133 135 Writes to foreign memory regions 45->135 137 Maps a DLL or memory area into another process 45->137 50 svchost.exe 45->50         started        53 shout.exe 45->53         started        file15 signatures16 process17 signatures18 77 Contains functionality to bypass UAC (CMSTPLUA) 50->77 79 Found evasive API chain (may stop execution after checking mutex) 50->79 81 Contains functionalty to change the wallpaper 50->81 91 3 other signatures 50->91 83 Antivirus detection for dropped file 53->83 85 Multi AV Scanner detection for dropped file 53->85 87 Machine Learning detection for dropped file 53->87 89 Deletes shadow drive data (may be related to ransomware) 53->89 55 WerFault.exe 19 16 53->55         started        process19
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2024-03-11 10:36:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:chaos family:remcos family:xworm family:zgrat botnet:remotehost persistence ransomware rat spyware stealer trojan
Behaviour
Modifies registry class
Opens file in notepad (likely ransom note)
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Sets desktop wallpaper using registry
Suspicious use of SetThreadContext
Adds Run key to start application
Drops desktop.ini file(s)
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Renames multiple (192) files with added filename extension
Chaos
Chaos Ransomware
Detect Xworm Payload
Detect ZGRat V1
Remcos
Xworm
ZGRat
Malware Config
C2 Extraction:
gamemodz.duckdns.org:2404
gamemodz.duckdns.org:7000
Unpacked files
SH256 hash:
145f1293ecf7f86d05ab1de173416b3109d4d25abe198757d6e41f5abd5ab986
MD5 hash:
3d1ff7b213f48027215b14d2ff0fae10
SHA1 hash:
fc17231def25445d0501b5369a1404994506a60c
SH256 hash:
79ec51c588fccbe876f58de8a0256e27de65aa14f245615c42bd92cc640063fe
MD5 hash:
bdfa7710dfc213d8babcd7348440deeb
SHA1 hash:
ecd7d6ad5a3e0cc8c24ce1f12a40b0c86a769f98
Detections:
Remcos win_remcos_w0 win_remcos_auto malware_windows_remcos_rat INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
SH256 hash:
7a7c4241408ffeb9835e7df90840bff1b2622ec0156eea742bc7c10312288db3
MD5 hash:
30a0272414b6cea0579618aa23004515
SHA1 hash:
7ceb9fac4e6c06358077a492cd7dc908334c26c2
Detections:
XWorm MALWARE_Win_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
d6adc4c1652ee2dfa486995f9ed9643177cee40b86f2d6f13b6b6b6ba4ea93c6
MD5 hash:
0887b9920b00b8826a309640bdae30ef
SHA1 hash:
207fcb02577be4f9618f274a7f1839d10a99ca0f
SH256 hash:
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04
MD5 hash:
411c2e3611e8ee701918cfe17399da79
SHA1 hash:
a01d2ceb1b9d0e002eb67a00fbac9238285dce85
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:MALWARE_Win_XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.
Rule name:win_remcos_rat_unpacked
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:win_remcos_w0
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:yarahub_win_remcos_rat_unpacked_aug_2023
Author:Matthew @ Embee_Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments



Avatar
zbet commented on 2024-03-11 10:35:40 UTC

url : hxxp://218.38.52.227:8000/PTVQIL/taskmgr.exe