MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8185c5af3e891bdb81a646bb410777393f7ba6db6f4fc0727948c4b95264334. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f8185c5af3e891bdb81a646bb410777393f7ba6db6f4fc0727948c4b95264334
SHA3-384 hash: 55e0334d4d4782bb9c3466a5b0aca8852adeaa7ec97f0a29c119f99ae00c850037676e0c2bfe5168080c8ce59778871f
SHA1 hash: d6bad18b6025d9bea349f178bcbf416010c3b4bd
MD5 hash: 6c828880cf1a66e50d5f9f199421c069
humanhash: speaker-august-artist-pizza
File name:SecuriteInfo.com.Trojan.DownLoader33.63103.7154.21167
Download: download sample
Signature RemcosRAT
File size:1'300'480 bytes
First seen:2020-07-12 19:39:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e2eeb99405cc09cd01bdcfea64f8b2a7 (2 x RemcosRAT)
ssdeep 24576:/c41yQoXCpv0vw2mDP7oSaG3tf7sZhGSt5X+G0c91gXpqrwb:/cNCaSkBhurQ
Threatray 781 similar samples on MalwareBazaar
TLSH E055AE2173918432E597A6384C8FF7E55833B9126EE1EC4A77E43D0C6F3E6917939282
Reporter SecuriteInfoCom
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching a process
Creating a file
Running batch commands
Creating a process with a hidden window
Deleting a recently created file
Setting a single autorun event
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Unauthorized injection to a system process
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-07-12 15:32:07 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence rat family:remcos
Behaviour
Script User-Agent
Suspicious use of WriteProcessMemory
Modifies registry key
Suspicious use of SetThreadContext
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Remcos
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe f8185c5af3e891bdb81a646bb410777393f7ba6db6f4fc0727948c4b95264334

(this sample)

  
Delivery method
Distributed via web download

Comments