Trojan

Trojan:Win32/Remcos.PDE!MTB (file analysis)

Malware Removal

The Trojan:Win32/Remcos.PDE!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Remcos.PDE!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Anomalous binary characteristics

How to determine Trojan:Win32/Remcos.PDE!MTB?


File Info:

name: CBB15E65BC255ADC6346.mlw
path: /opt/CAPEv2/storage/binaries/15aaf1108061a48b06e4c80c5b4c5c6c7aa46d7c0ac75859a0fd39f9a5212c4b
crc32: 625672EF
md5: cbb15e65bc255adc6346a88c90a548de
sha1: b0d03617f96075b6f71f51ce7147bc09b19c4cba
sha256: 15aaf1108061a48b06e4c80c5b4c5c6c7aa46d7c0ac75859a0fd39f9a5212c4b
sha512: 3d8325a6db91349385c0e92ce7291603f97fb14832ffcfe519ebb39655e5cd566d7ac363133ae5b8da6d51536d64495a849169a69d99cb2ff9460756849c4773
ssdeep: 12288:wTDxfHlE1XHBC/qo3R7HaZRZEBTV3bX3RfwUCm0gRS+:w3RFIHBCN3hHWeBTRFcH
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CCF47EA3E6E176B3C1EA197CAC0D9631A629BE346D55D48618D33E0C0F3DD80F71A693
sha3_384: c01a2b8f60eb3129b42e26770495a495e4e389eaecc473f8313c8e47f92f4ceb3d832081c3203fb87945a4bccf67e803
ep_bytes: 558bec83c4f0b8e4284600e82c2dfaff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Trojan:Win32/Remcos.PDE!MTB also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Noon.l!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Strictor.266183
FireEyeGen:Variant.Strictor.266183
McAfeeFareit-FCVN!CBB15E65BC25
AlibabaTrojanSpy:Win32/Injector.f55784db
K7GWTrojan-Downloader ( 005829421 )
Cybereasonmalicious.7f9607
CyrenW32/DelfInject.EY.gen!Eldorado
SymantecScr.MalPbs!gen1
ESET-NOD32Win32/TrojanDownloader.Delf.DIB
APEXMalicious
KasperskyHEUR:Trojan-Spy.Win32.Noon.gen
BitDefenderGen:Variant.Strictor.266183
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.Strictor.266183
DrWebTrojan.Siggen15.51722
TrendMicroTROJ_GEN.R002C0DKR21
McAfee-GW-EditionFareit-FCVN!CBB15E65BC25
EmsisoftGen:Variant.Strictor.266183 (B)
GDataGen:Variant.Strictor.266183
JiangminTrojanSpy.Noon.slx
eGambitUnsafe.AI_Score_90%
MAXmalware (ai score=84)
Antiy-AVLTrojan/Generic.ASMalwS.34D7EBD
MicrosoftTrojan:Win32/Remcos.PDE!MTB
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.FCVN.R453380
ALYacGen:Variant.Strictor.266183
VBA32BScope.TrojanSpy.Noon
MalwarebytesMalware.AI.3603997155
TrendMicro-HouseCallTROJ_GEN.R002C0DKR21
TencentTrojan.Win32.BitCoinMiner.la
YandexTrojan.Injector!QysyqlmHEqQ
IkarusTrojan.Inject
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Delf.DIB!tr
AVGWin32:Trojan-gen
PandaTrj/GdSda.A

How to remove Trojan:Win32/Remcos.PDE!MTB?

Trojan:Win32/Remcos.PDE!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment