MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff3b454c53b41c997d0ffea6eb74f4863720ab81a9c059ce9fa8fb2cee519278. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: ff3b454c53b41c997d0ffea6eb74f4863720ab81a9c059ce9fa8fb2cee519278
SHA3-384 hash: d6c49219341229bafdd1ee6cfece6ed851eac03606b66ab3fa0586fc8149f5d8bdb720f1e838d3d9ff9237bd1c9dd992
SHA1 hash: 19389e8b05838de1c204fa6d1a8f9e9ac828dd49
MD5 hash: 7a44131145250b5e0873103136f3bbe3
humanhash: pip-sink-seventeen-quebec
File name:7a44131145250b5e0873103136f3bbe3.js
Download: download sample
Signature RemcosRAT
File size:34'729 bytes
First seen:2026-02-28 10:26:56 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 384:hTT5CH/iCassRNb++/5V11WhvXM0W0x5vzK6IlHDdE:hTTP3sC++/vWhvM0W03vRUxE
TLSH T12EF242217D163D88CB834A257E44C8593FDE7BE0F4A7B07A81C6178998AE9ADC70CD71
Magika javascript
Reporter abuse_ch
Tags:geo js RemcosRAT TUR

Intelligence


File Origin
# of uploads :
1
# of downloads :
190
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
97.4%
Tags:
ransomware phishing shell sage
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm evasive fingerprint repaired
Verdict:
Malicious
File Type:
js
Detections:
Trojan-Downloader.PowerShell.NanoShield.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates multiple autostart registry keys
Creates processes via WMI
Delayed program exit found
Detected Remcos RAT
Excessive usage of taskkill to terminate processes
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
JavaScript source code contains functionality to generate code involving a shell, file or stream
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Decrypt And Execute Base64 Data
Sigma detected: Register Wscript In Run Key
Sigma detected: Remcos
Sigma detected: Suspicious PowerShell IEX Execution Patterns
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Unusual module load detection (module proxying)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected MSIL Injector
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1876322 Sample: hADlYXJ2h8.js Startdate: 28/02/2026 Architecture: WINDOWS Score: 100 109 talentaclub.com 2->109 111 yaso.su 2->111 113 6 other IPs or domains 2->113 123 Sigma detected: Register Wscript In Run Key 2->123 125 Suricata IDS alerts for network traffic 2->125 127 Found malware configuration 2->127 129 19 other signatures 2->129 10 powershell.exe 15 27 2->10         started        15 powershell.exe 1 22 2->15         started        17 powershell.exe 2->17         started        19 16 other processes 2->19 signatures3 process4 dnsIp5 117 talentaclub.com 165.22.55.158, 443, 49692, 49697 DIGITALOCEAN-ASNUS United States 10->117 119 pastefy.app 49.13.5.8, 443, 49691, 49696 HETZNER-ASDE Germany 10->119 121 yaso.su 104.21.77.239, 443, 49690, 49695 CLOUDFLARENETUS United States 10->121 105 C:\Users\user\AppData\...\afdmeg3f.cmdline, Unicode 10->105 dropped 107 C:\ProgramData107r1.js, ASCII 10->107 dropped 149 Suspicious powershell command line found 10->149 151 Creates multiple autostart registry keys 10->151 153 Writes to foreign memory regions 10->153 155 Found suspicious powershell code related to unpacking or dynamic code loading 10->155 21 MSBuild.exe 4 3 10->21         started        26 powershell.exe 12 10->26         started        34 2 other processes 10->34 157 Injects a PE file into a foreign processes 15->157 28 MSBuild.exe 15->28         started        36 3 other processes 15->36 30 MSBuild.exe 17->30         started        38 3 other processes 17->38 159 Wscript starts Powershell (via cmd or directly) 19->159 161 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->161 163 Suspicious execution chain found 19->163 165 Creates processes via WMI 19->165 32 powershell.exe 19->32         started        40 21 other processes 19->40 file6 signatures7 process8 dnsIp9 115 91.92.242.97, 2404, 49693, 49698 THEZONEBG Bulgaria 21->115 91 C:\ProgramData\remcos\logs.dat, data 21->91 dropped 131 Contains functionality to bypass UAC (CMSTPLUA) 21->131 133 Detected Remcos RAT 21->133 135 Contains functionalty to change the wallpaper 21->135 145 5 other signatures 21->145 42 cmd.exe 1 26->42         started        45 conhost.exe 26->45         started        137 Installs a global keyboard hook 28->137 139 Suspicious powershell command line found 32->139 141 Creates multiple autostart registry keys 32->141 47 powershell.exe 32->47         started        53 2 other processes 32->53 143 Creates processes via WMI 34->143 49 cvtres.exe 1 34->49         started        93 C:\Users\user\AppData\Local\...\0riubvt1.dll, PE32 36->93 dropped 51 cmd.exe 36->51         started        56 2 other processes 36->56 95 C:\Users\user\AppData\Local\...\35fi2rju.dll, PE32 38->95 dropped 58 3 other processes 38->58 97 C:\Users\user\AppData\Local\...\izobngdv.dll, PE32 40->97 dropped 99 C:\Users\user\AppData\Local\...\h0oo21rg.dll, PE32 40->99 dropped 101 C:\Users\user\AppData\Local\...\ghnzhjii.dll, PE32 40->101 dropped 103 2 other files (none is malicious) 40->103 dropped 60 16 other processes 40->60 file10 signatures11 process12 file13 147 Excessive usage of taskkill to terminate processes 42->147 62 taskkill.exe 1 42->62         started        65 taskkill.exe 1 42->65         started        73 2 other processes 42->73 67 cmd.exe 47->67         started        69 conhost.exe 47->69         started        75 4 other processes 51->75 89 C:\Users\user\AppData\Local\...\hkcoizfm.dll, PE32 53->89 dropped 71 cvtres.exe 53->71         started        77 4 other processes 58->77 79 20 other processes 60->79 signatures14 process15 signatures16 167 Creates processes via WMI 62->167 169 Excessive usage of taskkill to terminate processes 67->169 81 conhost.exe 67->81         started        83 taskkill.exe 67->83         started        85 taskkill.exe 67->85         started        87 taskkill.exe 67->87         started        process17
Gathering data
Threat name:
Script-JS.Trojan.NanoShield
Status:
Malicious
First seen:
2026-02-28 00:53:00 UTC
File Type:
Text (JavaScript)
AV detection:
7 of 36 (19.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:ndehost defense_evasion execution persistence rat
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Suspicious use of SetThreadContext
Adds Run key to start application
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Remcos
Remcos family
Malware Config
C2 Extraction:
91.92.242.97:2404
bbliss898:2404
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments