Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
|
|
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
|
AV Detection |
---|
Source: |
Malware Configuration Extractor: |
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Source: |
Integrated Neural Analysis Model: |
Source: |
HTTPS traffic detected: |
||
Source: |
HTTPS traffic detected: |
Source: |
Binary string: |
Source: |
Code function: |
9_2_254C10F1 | |
Source: |
Code function: |
14_2_0040AE51 | |
Source: |
Code function: |
16_2_00407EF8 |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
URLs: |
Source: |
DNS query: |
Source: |
TCP traffic: |
Source: |
HTTP traffic detected: |
Source: |
IP Address: |
Source: |
ASN Name: |
Source: |
JA3 fingerprint: |
||
Source: |
JA3 fingerprint: |
Source: |
Suricata IDS: |
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
Source: |
UDP traffic detected without corresponding DNS query: |
||
Source: |
UDP traffic detected without corresponding DNS query: |
||
Source: |
UDP traffic detected without corresponding DNS query: |
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
Source: |
DNS traffic detected: |
||
Source: |
DNS traffic detected: |
||
Source: |
DNS traffic detected: |
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
Source: |
Network traffic detected: |
||
Source: |
Network traffic detected: |
||
Source: |
Network traffic detected: |
||
Source: |
Network traffic detected: |
||
Source: |
Network traffic detected: |
||
Source: |
Network traffic detected: |
Source: |
HTTPS traffic detected: |
||
Source: |
HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: |
Windows user hook set: |
Jump to behavior |
Source: |
Code function: |
14_2_0041183A |
Source: |
Code function: |
14_2_0040987A | |
Source: |
Code function: |
14_2_004098E2 | |
Source: |
Code function: |
16_2_00406DFC | |
Source: |
Code function: |
16_2_00406E9F |
E-Banking Fraud |
---|
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
System Summary |
---|
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
Source: |
Code function: |
14_2_0040DD85 | |
Source: |
Code function: |
14_2_00401806 | |
Source: |
Code function: |
14_2_004018C0 | |
Source: |
Code function: |
16_2_004016FD | |
Source: |
Code function: |
16_2_004017B7 |
Source: |
Code function: |
2_2_00007FFD9B87BEB2 | |
Source: |
Code function: |
2_2_00007FFD9B87B106 | |
Source: |
Code function: |
2_2_00007FFD9B94A42A | |
Source: |
Code function: |
4_2_00A9EDF0 | |
Source: |
Code function: |
4_2_00A9F6C0 | |
Source: |
Code function: |
4_2_00A9EAA8 | |
Source: |
Code function: |
9_2_254CB5C1 | |
Source: |
Code function: |
9_2_254D7194 | |
Source: |
Code function: |
14_2_0044B040 | |
Source: |
Code function: |
14_2_0043610D | |
Source: |
Code function: |
14_2_00447310 | |
Source: |
Code function: |
14_2_0044A490 | |
Source: |
Code function: |
14_2_0040755A | |
Source: |
Code function: |
14_2_0043C560 | |
Source: |
Code function: |
14_2_0044B610 | |
Source: |
Code function: |
14_2_0044D6C0 | |
Source: |
Code function: |
14_2_004476F0 | |
Source: |
Code function: |
14_2_0044B870 | |
Source: |
Code function: |
14_2_0044081D | |
Source: |
Code function: |
14_2_00414957 | |
Source: |
Code function: |
14_2_004079EE | |
Source: |
Code function: |
14_2_00407AEB | |
Source: |
Code function: |
14_2_0044AA80 | |
Source: |
Code function: |
14_2_00412AA9 | |
Source: |
Code function: |
14_2_00404B74 | |
Source: |
Code function: |
14_2_00404B03 | |
Source: |
Code function: |
14_2_0044BBD8 | |
Source: |
Code function: |
14_2_00404BE5 | |
Source: |
Code function: |
14_2_00404C76 | |
Source: |
Code function: |
14_2_00415CFE | |
Source: |
Code function: |
14_2_00416D72 | |
Source: |
Code function: |
14_2_00446D30 | |
Source: |
Code function: |
14_2_00446D8B | |
Source: |
Code function: |
14_2_00406E8F | |
Source: |
Code function: |
16_2_00405038 | |
Source: |
Code function: |
16_2_0041208C | |
Source: |
Code function: |
16_2_004050A9 | |
Source: |
Code function: |
16_2_0040511A | |
Source: |
Code function: |
16_2_0043C13A | |
Source: |
Code function: |
16_2_004051AB | |
Source: |
Code function: |
16_2_00449300 | |
Source: |
Code function: |
16_2_0040D322 | |
Source: |
Code function: |
16_2_0044A4F0 | |
Source: |
Code function: |
16_2_0043A5AB | |
Source: |
Code function: |
16_2_00413631 | |
Source: |
Code function: |
16_2_00446690 | |
Source: |
Code function: |
16_2_0044A730 | |
Source: |
Code function: |
16_2_004398D8 | |
Source: |
Code function: |
16_2_004498E0 | |
Source: |
Code function: |
16_2_0044A886 | |
Source: |
Code function: |
16_2_0043DA09 | |
Source: |
Code function: |
16_2_00438D5E | |
Source: |
Code function: |
16_2_00449ED0 | |
Source: |
Code function: |
16_2_0041FE83 | |
Source: |
Code function: |
16_2_00430F54 |
Source: |
Process created: |
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
Jump to behavior |
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
Source: |
Classification label: |
Source: |
Code function: |
14_2_004182CE |
Source: |
Code function: |
14_2_00418758 |
Source: |
Code function: |
14_2_00413D4C |
Source: |
Code function: |
14_2_004148B6 |
Source: |
File created: |
Jump to behavior |
Source: |
Mutant created: |
||
Source: |
Mutant created: |
||
Source: |
Mutant created: |
||
Source: |
Mutant created: |
||
Source: |
Mutant created: |
||
Source: |
Mutant created: |
Source: |
File created: |
Jump to behavior |
Source: |
Process created: |
Source: |
System information queried: |
Jump to behavior |
Source: |
WMI Queries: |
||
Source: |
WMI Queries: |
Source: |
File read: |
Jump to behavior |
Source: |
Key opened: |
Jump to behavior |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Source: |
Evasive API call chain: |
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |