MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f30ea3e5ea06e9cb3ea8e6d219f3857f8e0d9bd1664476b9b5665aed0a167bda. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments 1

SHA256 hash: f30ea3e5ea06e9cb3ea8e6d219f3857f8e0d9bd1664476b9b5665aed0a167bda
SHA3-384 hash: 3945ad4a4457b339aceace0aaa257326f40fb3c8f4e2b28847508656a40ad2b024aca112641a3035ddb0333aac07dc3e
SHA1 hash: a62c5e632c9a471ce71c8e8426621c06e87e31bd
MD5 hash: e261290a7164cf5bc7dbbf98862cd961
humanhash: lake-potato-ceiling-tango
File name:e261290a7164cf5bc7dbbf98862cd961
Download: download sample
Signature RemcosRAT
File size:843'776 bytes
First seen:2021-11-30 17:50:05 UTC
Last seen:2021-11-30 19:41:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:DpYcrbhrZlbd9tkfVIvg5dbYMKwIMxnzpNOaH:D62bhrZZteVRVYMKCnF
Threatray 856 similar samples on MalwareBazaar
TLSH T17F052320438CD1A8C7FA817A44B9536E277D8B823C03D74EB764745C9587A827F8E56F
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e261290a7164cf5bc7dbbf98862cd961
Verdict:
Malicious activity
Analysis date:
2021-11-30 17:56:01 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Sigma detected: Suspicius Add Task From User AppData Temp
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 531392 Sample: RFIlSRQKzj Startdate: 30/11/2021 Architecture: WINDOWS Score: 100 83 mdec.nelreports.net 2->83 85 js.monitor.azure.com 2->85 87 3 other IPs or domains 2->87 103 Found malware configuration 2->103 105 Malicious sample detected (through community Yara rule) 2->105 107 Multi AV Scanner detection for dropped file 2->107 109 11 other signatures 2->109 10 RFIlSRQKzj.exe 7 2->10         started        signatures3 process4 file5 77 C:\Users\user\AppData\...\llmHcDGWBTRz.exe, PE32 10->77 dropped 79 C:\Users\user\AppData\Local\...\tmp25F5.tmp, XML 10->79 dropped 81 C:\Users\user\AppData\...\RFIlSRQKzj.exe.log, ASCII 10->81 dropped 111 Uses schtasks.exe or at.exe to add and modify task schedules 10->111 113 Adds a directory exclusion to Windows Defender 10->113 14 RFIlSRQKzj.exe 3 3 10->14         started        18 powershell.exe 24 10->18         started        20 schtasks.exe 1 10->20         started        22 RFIlSRQKzj.exe 10->22         started        signatures6 process7 dnsIp8 101 report59.duckdns.org 45.32.115.235, 49752, 8090 AS-CHOOPAUS United States 14->101 115 Writes to foreign memory regions 14->115 117 Allocates memory in foreign processes 14->117 119 Installs a global keyboard hook 14->119 121 Injects a PE file into a foreign processes 14->121 24 svchost.exe 12 14->24         started        26 svchost.exe 14->26         started        28 svchost.exe 14->28         started        34 4 other processes 14->34 30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        signatures9 process10 process11 36 chrome.exe 13 214 24->36         started        40 chrome.exe 24->40         started        42 chrome.exe 26->42         started        44 chrome.exe 26->44         started        46 chrome.exe 28->46         started        48 chrome.exe 28->48         started        50 chrome.exe 34->50         started        52 chrome.exe 34->52         started        54 4 other processes 34->54 dnsIp12 89 192.168.2.1 unknown unknown 36->89 91 192.168.2.4 unknown unknown 36->91 93 239.255.255.250 unknown Reserved 36->93 75 C:\...\pnacl_public_x86_64_pnacl_sz_nexe, ELF 36->75 dropped 56 chrome.exe 36->56         started        59 chrome.exe 40->59         started        61 chrome.exe 42->61         started        63 chrome.exe 44->63         started        65 chrome.exe 46->65         started        67 chrome.exe 48->67         started        69 chrome.exe 50->69         started        71 chrome.exe 52->71         started        73 4 other processes 54->73 file13 process14 dnsIp15 95 mdec.nelreports.net 56->95 97 accounts.google.com 142.250.180.109, 443, 49753 GOOGLEUS United States 56->97 99 10 other IPs or domains 56->99
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-11-29 20:20:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost brand:microsoft phishing rat
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Detected potential entity reuse from brand microsoft.
Suspicious use of SetThreadContext
Remcos
Malware Config
C2 Extraction:
report59.duckdns.org:8090
Unpacked files
SH256 hash:
77ea0c89fd8a67d55e5a91ee7a59ba1689a16d67ff8033db09ebc5272b56b6fe
MD5 hash:
1e586492de5b9cc7c081b9bc4b63356c
SHA1 hash:
f4f2caa95acf59242de6cc28f8fc0d2abbda71f2
SH256 hash:
2c65cec7ce93ae79c5e89743e651bec2cecb1f5b62338a0a624bf3267872a222
MD5 hash:
1c61a514d9939e84cdffdc66f8f64a92
SHA1 hash:
941e4de4d2cde63a1db328e999135f044344fe8b
Detections:
win_remcos_g0
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
f30ea3e5ea06e9cb3ea8e6d219f3857f8e0d9bd1664476b9b5665aed0a167bda
MD5 hash:
e261290a7164cf5bc7dbbf98862cd961
SHA1 hash:
a62c5e632c9a471ce71c8e8426621c06e87e31bd
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe f30ea3e5ea06e9cb3ea8e6d219f3857f8e0d9bd1664476b9b5665aed0a167bda

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-30 17:50:06 UTC

url : hxxps://pasaranliga.com/wp-includes/Requests/Exception/Transport/RevisedPInxubuleindustries.exe