MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f830ced2c0d06737392dddabd93828fa37430b0c6ec27cb7186c46d5e2f570b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 17
| SHA256 hash: | f830ced2c0d06737392dddabd93828fa37430b0c6ec27cb7186c46d5e2f570b8 |
|---|---|
| SHA3-384 hash: | 285849ce2d1175bb4f1ef14d2d8621d93eb0e36ef765f71ab31f9b1e282f808089fbf884e8c71d46788ae01740c92a4d |
| SHA1 hash: | f50c1f889bec8791cedb78d29b13acd6a610c4fb |
| MD5 hash: | 9bf8c117b8737c7001b81b63fc13943b |
| humanhash: | mountain-fruit-berlin-east |
| File name: | Swift copy.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 564'685 bytes |
| First seen: | 2022-12-07 11:40:44 UTC |
| Last seen: | 2022-12-16 10:26:49 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ab6770b0a8635b9d92a5838920cfe770 (84 x Formbook, 30 x AgentTesla, 15 x Loki) |
| ssdeep | 12288:gyI0+stnJ1EDBFyrpXtCvjCw10Uov7uec1hn4Kl0WUX:g30+stvsF0xovjt10Uuc17bUX |
| Threatray | 2'314 similar samples on MalwareBazaar |
| TLSH | T12DC4234578C1C7B7F0A206FEFD3972C5C6F6E76B902A6D720F169E318686685EC0244B |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe RAT RemcosRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
177
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
remcos
ID:
1
File name:
Swift copy.exe
Verdict:
Malicious activity
Analysis date:
2022-12-07 11:42:37 UTC
Tags:
remcos
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Remcos
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Searching for the window
Сreating synchronization primitives
Setting a keyboard event handler
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
LockBit Ransomware
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Delayed program exit found
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-12-07 10:25:53 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
21 of 25 (84.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 2'304 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos botnet:uc persistence rat
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
ucremcz1.ddns.net:1823
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c2296809155417083c5c50349b1c817a942c72a3411251fbcd6900558be81ed1
MD5 hash:
2dbb39ff68e2110693f6fa79a766c3be
SHA1 hash:
6eccdf701150d004c49aff4070f0f34c16ae1a0b
Detections:
Remcos
win_remcos_auto
Parent samples :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 hash:
dcb61c55ba74a131833f2b76c595b19ee447b05b744d19ab3900d74109eb5d98
MD5 hash:
ed0d3ca53ccaad84a09ad0613b79259f
SHA1 hash:
9c2585983bd6e53d469f55aa09766c96372f41b0
SH256 hash:
f830ced2c0d06737392dddabd93828fa37430b0c6ec27cb7186c46d5e2f570b8
MD5 hash:
9bf8c117b8737c7001b81b63fc13943b
SHA1 hash:
f50c1f889bec8791cedb78d29b13acd6a610c4fb
Malware family:
Remcos
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.