Windows
Analysis Report
1736984347ea2e5f31dec96d559398ef022940c65b7dbf898b88f872c9a695d467d574b77f522.dat-decoded.exe
Overview
General Information
Sample name: | 1736984347ea2e5f31dec96d559398ef022940c65b7dbf898b88f872c9a695d467d574b77f522.dat-decoded.exe |
Analysis ID: | 1592275 |
MD5: | d59189bb834af4ca4e6b6dbe3bf53c09 |
SHA1: | 4a84ef29e1f1227982f1276f50c350a7117640e9 |
SHA256: | 2ecfdb89f16c1535e6cc6a83275bd9fbd1e0d8e86db04c04f826146b49d3f691 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | File source: |
Source: | Binary or memory string: | memstr_390aed86-0 |
Exploits |
---|
Source: | File source: |
Source: | String found in binary or memory: |
Source: | File source: |
E-Banking Fraud |
---|
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | 1 System Information Discovery | Remote Services | 1 Archive Collected Data | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1592275 |
Start date and time: | 2025-01-16 00:40:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1736984347ea2e5f31dec96d559398ef022940c65b7dbf898b88f872c9a695d467d574b77f522.dat-decoded.exe |
Detection: | MAL |
Classification: | mal64.troj.expl.winEXE@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse as no analysis process or sample was found
- Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
- Exclude process from analysis (whitelisted): dllhost.exe
File type: | |
Entropy (8bit): | 6.664319106886378 |
TrID: |
|
File name: | 1736984347ea2e5f31dec96d559398ef022940c65b7dbf898b88f872c9a695d467d574b77f522.dat-decoded.exe |
File size: | 523'565 bytes |
MD5: | d59189bb834af4ca4e6b6dbe3bf53c09 |
SHA1: | 4a84ef29e1f1227982f1276f50c350a7117640e9 |
SHA256: | 2ecfdb89f16c1535e6cc6a83275bd9fbd1e0d8e86db04c04f826146b49d3f691 |
SHA512: | 440e9b3832be714b0c93ffd6d8e1bc439f4c1839e627cd13cf3758461966254957a2692a138bcb69e8047e02b39e881f2a7424540d96b685207b2ab520cc83e2 |
SSDEEP: | 12288:BSEAX2AdZFy6uRadTIlYK2MRPx1tghCCeepZQnn:PAX2AZFy6u0dklYYtghCVMZ6 |
TLSH: | DAB48D11A691C072E8F75E300A2AEEB2FEBABC1014254C7B77DE0C76BDB15407625EA1 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H...H...H....(..H....*..H....+..H...0]..H..&....H..8... ...H... ...H... ...H...0J..H...H...I...!...H...!&..H...!...H..Rich |
Icon Hash: | 00928e8e8686b000 |