Threat Database Backdoors Backdoor.MSIL.Remcos.GB

Backdoor.MSIL.Remcos.GB

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 21,490
Threat Level: 60 % (Medium)
Infected Computers: 23
First Seen: November 28, 2023
Last Seen: March 13, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.MSIL.Remcos.GB
Signature status: Hash Mismatch

Known Samples

MD5: f38e16e3a03d52c326148c81d79f72c2
SHA1: cd5d380c4591e59588d5df6965e7140d78717ca5
SHA256: B24DD8212095F85C552A6CCAF8B095CF402E7FFC626D2100A479D65C2FF9F8E0
File Size: 1.81 MB, 1806704 bytes
MD5: c1c339cb8d1ad6373331fe1d0f47aff2
SHA1: c45dbe97ddc836451755974ca73bc3f875c1c853
SHA256: CDE9891C1FCBBD37603B47411BE6CB045DDACFCF0C301650A4CC0F793C9CEC3C
File Size: 1.91 MB, 1906176 bytes
MD5: 715ae126b530042466eb79578d16cc42
SHA1: 1d8754b087e05b3d362ad9e6b6475e3b162b4dea
SHA256: B28BC8CD8C1F51AC05E34AEA8D3CFFAC564E6A84AE4CFFEA012916D55AAF2875
File Size: 6.62 MB, 6620776 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 8.0.3810.9
  • 3.0.21.0
  • 1.0.0.0
Comments
  • Java Platform SE binary
  • VLC media player
Company Name
  • Oracle Corporation
  • VideoLAN
File Description
  • Java Platform SE binary
  • Vhgkacirwkb
  • VLC media player
File Version
  • 8.0.3810.9
  • 3.0.21.0
  • 1.0.0.0
Internal Name
  • Cerjvz.exe
  • Java2.exe
  • Vhgkacirwkb.exe
Legal Copyright
  • Copyright © 1996-2024 VideoLAN and VLC Authors
  • Copyright © 2023
  • Copyright © 2024
Legal Trademarks VLC media player, VideoLAN and x264 are registered trademarks from VideoLAN
Original Filename
  • Cerjvz.exe
  • Java2.exe
  • Vhgkacirwkb.exe
Product Name
  • Java Platform SE 8 U381
  • Vhgkacirwkb
  • VLC media player
Product Version
  • 8.0.3810.9
  • 3.0.21.0
  • 1.0.0.0

Digital Signatures

Signer Root Status
Oracle America, Inc. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Hash Mismatch
VideoLAN DigiCert Trusted Root G4 Hash Mismatch
VideoLAN DigiCert Trusted Root G4 Hash Mismatch

File Traits

  • .NET
  • GenKrypt
  • HighEntropy
  • x64
  • x86

Block Information

Total Blocks: 1,791
Potentially Malicious Blocks: 281
Whitelisted Blocks: 676
Unknown Blocks: 834

Visual Map

? ? x ? ? ? x 0 0 x ? 0 ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 ? x 0 ? x 0 x x x x ? 0 ? ? x x x x ? ? ? 0 ? 0 0 x x ? 0 x x ? ? ? 0 ? x x x x x 0 0 x 0 ? ? x x ? 0 0 x x ? 0 ? ? ? 0 x x 0 0 ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? 0 0 ? ? 0 ? x x x x x x x ? ? 0 0 0 ? ? ? ? 0 0 ? ? 0 0 x 0 ? ? ? ? ? ? ? ? ? 0 0 x ? ? 0 ? ? ? ? 0 ? 0 ? 0 0 ? 0 ? ? ? 0 x ? 0 0 0 0 0 0 ? x ? ? 0 ? 0 0 0 0 ? ? 0 0 0 ? ? ? ? ? ? ? 0 ? ? ? 0 0 0 0 0 0 0 ? 0 0 x ? ? 0 ? ? ? ? ? 0 0 0 0 0 0 ? ? 0 0 ? 0 ? ? 0 0 ? ? x x x ? ? ? x 0 0 ? x x ? 0 0 0 ? x ? ? ? 0 ? ? ? ? x x x x x 0 x 0 0 ? ? 0 0 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? 0 0 x x ? 0 0 x ? ? 0 0 0 ? ? ? ? 0 0 0 x ? ? ? ? 0 0 0 0 0 0 0 x ? ? ? ? ? ? ? ? 0 0 ? x ? ? 0 ? 0 0 0 0 0 x x ? ? x x ? 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? ? 0 ? 0 0 0 ? ? ? x x ? x x x ? 0 0 0 x 0 ? 0 ? 0 0 ? 0 0 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 x 0 0 ? ? 0 0 0 0 0 0 0 0 x ? ? ? 0 0 0 0 0 0 ? ? 0 0 ? ? 0 0 ? ? ? ? ? ? x x x ? 0 0 0 ? ? x 0 0 0 ? ? x ? 0 0 x 0 0 ? ? 0 x ? ? ? ? ? x 0 0 0 x 0 0 0 0 0 ? ? 0 ? x ? ? ? x ? 0 0 0 0 ? ? ? ? ? 0 ? ? ? x ? ? ? 0 0 0 0 ? x 0 0 0 0 ? ? 0 0 0 ? ? x ? ? ? ? x ? ? 0 0 0 ? x x ? ? ? ? 0 0 ? ? 0 0 ? ? 0 0 ? ? 0 ? ? 0 ? ? ? ? ? ? ? 0 ? x x ? ? ? 0 x ? ? ? 0 x ? ? ? 0 0 0 0 ? x 0 ? 0 ? 0 0 0 0 0 0 ? ? ? ? ? ? 0 0 ? x ? x 0 0 ? ? 0 0 0 0 0 0 0 ? ? x x x ? ? ? 0 x 0 0 0 0 0 ? ? ? ? x x ? x ? ? 0 0 0 0 0 0 0 0 ? ? 0 ? ? ? 0 ? ? 0 0 ? ? ? ? x ? ? 0 ? x ? 0 0 x ? 0 ? x 0 ? 0 ? 0 x x ? ? ? 0 ? x ? ? ? x 0 0 0 ? x 0 0 ? 0 ? ? x 0 ? ? ? ? ? x ? 0 ? 0 ? x ? ? ? 0 ? 0 ? 0 ? 0 0 0 0 ? x x x ? ? ? ? 0 0 ? ? ? ? 0 0 0 ? 0 0 x ? ? x ? 0 0 0 x 0 0 0 ? ? x ? 0 0 0 x 0 0 0 ? ? ? ? ? ? ? ? 0 ? ? 0 0 0 0 0 0 ? 0 0 0 0 0 x ? 0 0 x 0 0 0 ? ? ? ? 0 ? ? x x x x x x x x ? ? ? 0 ? x x 0 ? x x ? 0 0 ? x x ? x ? ? ? ? x ? x 0 ? x ? ? ? x ? ? ? x ? 0 x ? ? ? x x 0 ? ? 0 x 0 x ? ? ? x x x ? ? x x ? 0 0 ? ? 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? 0 x 0 ? ? ? x ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? 0 0 x ? ? ? ? x ? 0 x ? 0 x ? ? x x ? 0 ? 0 0 0 ? ? ? ? ? 0 ? ? 0 ? 0 ? ? ? 0 ? 0 ? 0 x ? 0 x 0 0 x 0 0 0 0 0 0 0 ? x 0 0 0 ? ? ? ? ? ? ? ? 0 ? ? ? 0 0 0 ? ? x 0 0 0 ? 0 0 ? 0 x ? ? 0 ? ? ? 0 x ? ? 0 x ? ? 0 ? ? ? 0 ? ? ? x ? ? x ? ? 0 ? x 0 0 ? x ? ? 0 ? ? 0 ? ? 0 0 0 ? ? ? ? x x ? ? 0 0 ? ? ? ? ? ? x ? ? 0 ? 0 0 ? x ? ? ? ? x ? ? x 0 ? ? ? x 0 x x ? ? 0 0 ? ? ? x ? ? ? ? ? ? ? ? 0 ? ? ? ? 0 0 0 0 ? 0 0 0 0 ? 0 ? 0 0 0 0 x x ? x ? 0 ? 0 ? ? ? x ? ? x 0 0 0 0 0 0 x ? x ? 0 0 0 0 0 ? ? x ? ? x 0 x ? ? 0 ? 0 ? ? ? ? ? 0 0 0 ? ? 0 0 ? ? ? ? ? ? ? ? ? ? x ? 0 ? 0 0 0 0 0 0 x x x x ? 0 x x x x 0 0 0 0 ? x x x ? x ? ? ? ? ? x ? x 0 x ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 x x ? ? ? ? ? ? ? ? x ? 0 ? ? 0 0 0 0 0 0 0 ? 0 x 0 x 0 x 0 x 0 x ? x ? 0 0 0 0 0 x x ? ? ? ? 0 0 ? 0 0 0 x 0 ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? x 0 ? ? ? 0 ? 0 0 0 x ? ? 0 0 0 ? ? 0 0 ? ? 0 0 ? ? ? 0 x x 0 0 0 ? ? x 0 0 0 ? ? ? 0 ? ? ? ? 0 ? ? ? x ? ? ? 0 0 ? ? ? ? x ? ? ? ? x ? x ? ? ? ? 0 0 0 x ? ? ? 0 0 ? 0 ? 0 0 ? 0 ? 0 ? 0 ? ? 0 0 ? ? 0 ? x x 0 x 0 x ? x 0 x ? x ? 0 x x ? 0 0 ? ? 0 ? x 0 x ? x ? ? 0 ? ? ? ? ? 0 0 0 ? ? 0 ? ? ? 0 0 0 ? 0 0 x ? x ? x ? ? 0 0 0 0 ? 0 0 0 ? ? ? ? 0 ? 0 0 x ? ? ? ? 0 ? ? ? ? 0 0 0 ? 0 0 x 0 ? ? ? x ? ? ? ? ? 0 0 0 0 0 0 x x x ? ? ? x ? 0 ? ? ? ? 0 0 0 0 ? 0 0 ? 0 ? 0 x 0 0 0 ? ? ? ? ? ? ? 0 0 0 0 0 0 0 x 0 ? x ? ? x ? 0 0 x ? ? ? ? 0 0 ? 0 x ? ? ? 0 ? ? 0 0 x x ? ? 0 0 0 ? ? 0 0 ? 0 0 ? 0 0 0 0 ? ? 0 ? ? 0 ? ? ? 0 ? ? 0 0 ? 0 0 ? x ? ? 0 ? ? ? ? 0 0 0 ? ? ? ? ? ? ? ? ? ? 0 0 ? ? 0 ? 0 ? ? ? ? ? ? 0 0 0 0 0 x 0 0 ? ? 0 ? ? ? 0 ? 0 0 ? ? x 0 x x 0 ? x 0 ? ? 0 ? x 0 ? x 0 ? x 0 ? x x x ? ? 0 x x x x ? x 0 0 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Downloader.IFA
  • MSIL.PureLogStealer.B

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtCancelTimer2
  • ntdll.dll!NtCancelWaitCompletionPacket
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
Show More
  • ntdll.dll!NtCompareObjects
  • ntdll.dll!NtCompareSigningLevels
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateUserProcess
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFlushProcessWriteBuffers
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtGetCachedSigningLevel
  • ntdll.dll!NtGetContextThread
  • ntdll.dll!NtGetWriteWatch
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtResetWriteWatch
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetContextThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtSuspendThread
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtUnsubscribeWnfStateChange
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserName
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Other Suspicious
  • AdjustTokenPrivileges
Process Terminate
  • TerminateProcess
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory

Trending

Most Viewed

Loading...