MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f1ee84bf85dec48e4b94e5967de93bbed0d1b96ef43d68c2aa0b8ab7675d2c70. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 16
| SHA256 hash: | f1ee84bf85dec48e4b94e5967de93bbed0d1b96ef43d68c2aa0b8ab7675d2c70 |
|---|---|
| SHA3-384 hash: | 78c94cb5bab5bed590d01fcb46dd0ce6e841677810589c8aea466fdaa289c59790873ff452c109e474f3daaa437f07f2 |
| SHA1 hash: | 0441839c8aaf53c06ec48e698da276b499ba21b5 |
| MD5 hash: | 42f46f5712661c1cde04667a69263196 |
| humanhash: | double-rugby-quebec-wyoming |
| File name: | Payment receipt.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 500'699 bytes |
| First seen: | 2022-12-02 09:02:50 UTC |
| Last seen: | 2022-12-02 10:36:21 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ab6770b0a8635b9d92a5838920cfe770 (84 x Formbook, 30 x AgentTesla, 15 x Loki) |
| ssdeep | 12288:VAJQhjuFi1ckK160/7qNPG4GT1jj8MW3XJ7I+GZb6qt+uP8:WJT41ckKE0/4G4u1jj8MWnJ7jG16w+/ |
| TLSH | T120B423062CF0C0ABE6E647B24536B680B63773690AEB90CE17815FFC69325E1C56F257 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | f4f679b179698cd4 (17 x RemcosRAT, 4 x SnakeKeylogger, 2 x NanoCore) |
| Reporter | |
| Tags: | exe RAT RemcosRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
remcos
ID:
1
File name:
Payment receipt.exe
Verdict:
Malicious activity
Analysis date:
2022-12-02 09:05:00 UTC
Tags:
rat remcos
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Remcos
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Setting a keyboard event handler
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
REMCOS
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Sigma detected: Remcos
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-12-02 09:03:10 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
19 of 26 (73.08%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos botnet:uc persistence rat
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
ucremcz1.ddns.net:1823
Gathering data
Unpacked files
SH256 hash:
c2296809155417083c5c50349b1c817a942c72a3411251fbcd6900558be81ed1
MD5 hash:
2dbb39ff68e2110693f6fa79a766c3be
SHA1 hash:
6eccdf701150d004c49aff4070f0f34c16ae1a0b
Detections:
Remcos
win_remcos_auto
Parent samples :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 hash:
89f84d974662db251ac18275abf51fae9a958da0930c612210047250477f62b1
MD5 hash:
b762ac88d9d934e1711e631db2880135
SHA1 hash:
dfcd02307fa39c7c09779de4d3b520f90b7ffabf
SH256 hash:
f1ee84bf85dec48e4b94e5967de93bbed0d1b96ef43d68c2aa0b8ab7675d2c70
MD5 hash:
42f46f5712661c1cde04667a69263196
SHA1 hash:
0441839c8aaf53c06ec48e698da276b499ba21b5
Malware family:
Remcos
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.