Malware Analysis Report

2025-08-05 11:55

Sample ID 240215-s4j1paah47
Target 484-55-0x0000000005130000-0x0000000006130000-memory.dmp
SHA256 b8a391aee57ad8e3b3df34b82115b4bdec916c4f8d59b453a2162bcce1b19bbb
Tags
remcos rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b8a391aee57ad8e3b3df34b82115b4bdec916c4f8d59b453a2162bcce1b19bbb

Threat Level: Known bad

The file 484-55-0x0000000005130000-0x0000000006130000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

remcos rat

Remcos

Remcos family

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-15 15:40

Signatures

Remcos family

remcos

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-15 15:40

Reported

2024-02-15 15:43

Platform

win7-20231215-en

Max time kernel

119s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\484-55-0x0000000005130000-0x0000000006130000-memory.exe"

Signatures

Remcos

rat remcos

Processes

C:\Users\Admin\AppData\Local\Temp\484-55-0x0000000005130000-0x0000000006130000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\484-55-0x0000000005130000-0x0000000006130000-memory.exe"

Network

N/A

Files

memory/2076-0-0x0000000000590000-0x0000000000615000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-15 15:40

Reported

2024-02-15 15:43

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\484-55-0x0000000005130000-0x0000000006130000-memory.exe"

Signatures

Remcos

rat remcos

Processes

C:\Users\Admin\AppData\Local\Temp\484-55-0x0000000005130000-0x0000000006130000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\484-55-0x0000000005130000-0x0000000006130000-memory.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 179.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 186.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 89.16.208.104.in-addr.arpa udp

Files

memory/4312-0-0x0000000000590000-0x0000000000615000-memory.dmp