MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f197a58d2ac9ac937c5d417d0800d4804a80402395cdde0fe42dec0931674da4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 12 File information Comments 1

SHA256 hash: f197a58d2ac9ac937c5d417d0800d4804a80402395cdde0fe42dec0931674da4
SHA3-384 hash: a1cc464847eb091103181576a89f50cb97d1208cfd9ab3bb33b4acc79dab1b7ad1ecf9b6a8ca6e7c56e6c66d2b3c8813
SHA1 hash: dc307074db36fefeb99a5c1715b90a1382493d70
MD5 hash: c88d4757ee5c295c3ff996dca43e737a
humanhash: montana-failed-cardinal-moon
File name:c88d4757ee5c295c3ff996dca43e737a
Download: download sample
Signature RemcosRAT
File size:1'011'200 bytes
First seen:2023-08-08 07:14:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:x+h7rFnTibJ2tYdG7T+IAmvHfvT2Nxda5vWfco//3HS8meXaI1eIEJJZ3gSeYApt:S6byT+I/vXT2NMWfco//3y8m29MQCyt
Threatray 2'605 similar samples on MalwareBazaar
TLSH T1102523339FEC1161E269A3FCA8E601032276D38229EA7F4B44D483754E63F1675D1DAE
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
288
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
c88d4757ee5c295c3ff996dca43e737a
Verdict:
Malicious activity
Analysis date:
2023-08-08 07:16:32 UTC
Tags:
rat remcos remote keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% directory
Launching a process
Creating a file
DNS request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds extensions / path to Windows Defender exclusion list
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1287502 Sample: CHQTC4muks.exe Startdate: 08/08/2023 Architecture: WINDOWS Score: 100 69 Found malware configuration 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 Antivirus detection for URL or domain 2->73 75 9 other signatures 2->75 9 Ktwrl.exe 4 2->9         started        12 CHQTC4muks.exe 1 6 2->12         started        15 Ktwrl.exe 3 2->15         started        process3 file4 81 Multi AV Scanner detection for dropped file 9->81 83 Machine Learning detection for dropped file 9->83 85 Adds extensions / path to Windows Defender exclusion list 9->85 17 cmd.exe 9->17         started        61 C:\Users\user\AppData\Roaming\Ktwrl.exe, PE32 12->61 dropped 87 Writes to foreign memory regions 12->87 89 Injects a PE file into a foreign processes 12->89 19 MSBuild.exe 3 16 12->19         started        24 cmd.exe 1 12->24         started        26 cmd.exe 15->26         started        signatures5 process6 dnsIp7 28 Ktwrl.exe 17->28         started        31 conhost.exe 17->31         started        63 212.193.30.230, 3343, 49698, 49700 SPD-NETTR Russian Federation 19->63 65 geoplugin.net 178.237.33.50, 49699, 80 ATOM86-ASATOM86NL Netherlands 19->65 59 C:\ProgramData\remcos\logs.dat, data 19->59 dropped 77 Installs a global keyboard hook 19->77 79 Adds extensions / path to Windows Defender exclusion list 24->79 33 powershell.exe 21 24->33         started        35 conhost.exe 24->35         started        37 Ktwrl.exe 26->37         started        39 conhost.exe 26->39         started        file8 signatures9 process10 signatures11 41 cmd.exe 28->41         started        44 MSBuild.exe 28->44         started        93 Writes to foreign memory regions 37->93 95 Adds extensions / path to Windows Defender exclusion list 37->95 97 Injects a PE file into a foreign processes 37->97 46 cmd.exe 37->46         started        48 MSBuild.exe 37->48         started        process12 signatures13 50 conhost.exe 41->50         started        52 powershell.exe 41->52         started        91 Adds extensions / path to Windows Defender exclusion list 46->91 54 powershell.exe 46->54         started        57 conhost.exe 46->57         started        process14 dnsIp15 67 192.168.2.1 unknown unknown 54->67
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-08-08 07:15:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
212.193.30.230:3343
79.110.49.161:3343
Unpacked files
SH256 hash:
586fb6890cb801df0df51c9f69a52e54445bbbde4ac20155353fdb43faae7504
MD5 hash:
f1441f0a36ab4f948a4a1936d6cb374e
SHA1 hash:
f1a9b476a0c24143d8cd5897fba395cd18804893
Detections:
Remcos win_remcos_auto
SH256 hash:
a0893e5a43047506c5b7797af8070fa76221bce5bfb379a8781bdd4d9705ebda
MD5 hash:
d89c18ee88a865fc635821283ec29d8b
SHA1 hash:
bbe59e44ad0da79cc03eb19db5b168d365554e98
SH256 hash:
9953099b5ddeba3b384598e56b35306c83f11fe1f8760586a79343eb0278713a
MD5 hash:
5c7f43fc5e6f121a7980359319c76152
SHA1 hash:
841fb85c89fde3ef37b71b77dace6c40e6850fbf
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
f197a58d2ac9ac937c5d417d0800d4804a80402395cdde0fe42dec0931674da4
MD5 hash:
c88d4757ee5c295c3ff996dca43e737a
SHA1 hash:
dc307074db36fefeb99a5c1715b90a1382493d70
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe f197a58d2ac9ac937c5d417d0800d4804a80402395cdde0fe42dec0931674da4

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-08-08 07:14:04 UTC

url : hxxp://179.43.175.187/olmx/bank.exe