MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52de83987941b92875cecdd1661cc2757eae4f02ef564fd2e147d06eb9d8ab44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 14 File information Comments

SHA256 hash: 52de83987941b92875cecdd1661cc2757eae4f02ef564fd2e147d06eb9d8ab44
SHA3-384 hash: 9b0f8e1a4b4efb14d8bdbe52cf98bc34afdd077ec0fc14e90275491aa4189c897c4b1a8ff825ece52b9bc9d5d8648bd7
SHA1 hash: 49ab9fbe607129d70702cee541133002b3b9e15b
MD5 hash: 95955f84fedd9d7cb867638e65f6911b
humanhash: emma-jig-river-music
File name:tungbot.exe
Download: download sample
Signature AveMariaRAT
File size:240'240 bytes
First seen:2024-01-13 02:54:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c16c795b57934183422be5f6df7d891 (36 x Mofksys, 18 x CryptOne, 6 x AveMariaRAT)
ssdeep 6144:UsLqdufVUNDaTeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeel:PFUNDaTeeeeeeeeeeeeeeeeeeeeeeee1
Threatray 7 similar samples on MalwareBazaar
TLSH T169347D236B28842DD5B987F174B1822973719D1A0B91DE1B67C3BA843A71703B9F437B
TrID 42.6% (.EXE) Win32 Executable (generic) (4505/5/1)
19.4% (.ICL) Windows Icons Library (generic) (2059/9)
18.9% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
dhash icon 65626363c383e261 (2 x SnakeKeylogger, 1 x MassLogger, 1 x AveMariaRAT)
Reporter adm1n_usa32
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
331
Origin country :
RO RO
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
4363463463464363463463463.exe
Verdict:
Malicious activity
Analysis date:
2023-12-22 08:42:24 UTC
Tags:
loader hausbomber opendir phorpiex trojan rhadamanthys stealer azorult evasion parallax remote purplefox backdoor systembc proxy botnet formbook spyware redline arechclient2 pureloader purecrypter stealc dupzom servstart autoit rat dcrat ramnit lumma amadey metasploit gh0st

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file in the Windows subdirectories
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
DNS request
Creating a file in the %temp% directory
Reading critical registry keys
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Setting a single autorun event
Stealing user critical data
Sending an HTTP GET request to an infection source
Enabling a "Do not show hidden files" option
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm fingerprint hacktool lolbin lolbin overlay packed replace shell32 stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
CryptOne, Mofksys, RedLine
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected CryptOne packer
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Mofksys
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1374110 Sample: tungbot.exe Startdate: 13/01/2024 Architecture: WINDOWS Score: 100 60 codecmd03.googlecode.com 2->60 62 codecmd02.googlecode.com 2->62 64 3 other IPs or domains 2->64 74 Multi AV Scanner detection for domain / URL 2->74 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 12 other signatures 2->80 11 tungbot.exe 1 3 2->11         started        15 svchost.exe 2->15 injected 17 explorer.exe 2->17         started        19 svchost.exe 2->19         started        signatures3 process4 file5 56 C:\Windows\Resources\Themes\icsys.icn.exe, MS-DOS 11->56 dropped 58 C:\Users\user\Desktop\tungbot.exe, PE32 11->58 dropped 98 Drops executables to the windows directory (C:\Windows) and starts them 11->98 21 icsys.icn.exe 2 11->21         started        25 tungbot.exe 15 60 11->25         started        100 Injects code into the Windows Explorer (explorer.exe) 15->100 28 consent.exe 15->28         started        30 explorer.exe 1 15->30         started        32 svchost.exe 15->32         started        signatures6 process7 dnsIp8 52 C:\Windows\Resources\Themes\explorer.exe, MS-DOS 21->52 dropped 86 Drops PE files with benign system names 21->86 34 explorer.exe 14 21->34         started        70 103.173.227.25, 12664, 49730, 49734 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 25->70 72 103.170.118.35, 49729, 80 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 25->72 88 Found many strings related to Crypto-Wallets (likely being stolen) 25->88 90 Tries to harvest and steal browser information (history, passwords, etc) 25->90 92 Tries to steal Crypto Currency Wallets 25->92 39 conhost.exe 25->39         started        94 Writes to foreign memory regions 28->94 file9 signatures10 process11 dnsIp12 66 googlecode.l.googleusercontent.com 142.251.163.82, 49732, 49733, 49736 GOOGLEUS United States 34->66 68 172.253.115.82, 49735, 49738, 49746 GOOGLEUS United States 34->68 50 C:\Windows\Resources\spoolsv.exe, MS-DOS 34->50 dropped 82 System process connects to network (likely due to code injection or exploit) 34->82 84 Drops PE files with benign system names 34->84 41 spoolsv.exe 2 34->41         started        file13 signatures14 process15 file16 54 C:\Windows\Resources\svchost.exe, MS-DOS 41->54 dropped 96 Drops PE files with benign system names 41->96 45 svchost.exe 2 2 41->45         started        signatures17 process18 signatures19 102 Detected CryptOne packer 45->102 104 Drops executables to the windows directory (C:\Windows) and starts them 45->104 48 spoolsv.exe 1 45->48         started        process20
Threat name:
Win32.Trojan.Golsys
Status:
Malicious
First seen:
2023-10-25 11:40:11 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
37 of 38 (97.37%)
Threat level:
  5/5
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:redline family:sectoprat botnet:cheat discovery evasion infostealer persistence rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Drops file in System32 directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Modifies visiblity of hidden/system files in Explorer
RedLine
RedLine payload
SectopRAT
SectopRAT payload
Malware Config
C2 Extraction:
103.173.227.25:12664
Unpacked files
SH256 hash:
bc929754d1fee83d4faa1cefb6bc48e8304ff125606972962daa0799973df8b8
MD5 hash:
a4979638b247751333d486aeb7481228
SHA1 hash:
4d8e13846df61c250d35c75a66987a3288db717b
Detections:
MALWARE_Win_RedLine INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs RedLine_a
SH256 hash:
52de83987941b92875cecdd1661cc2757eae4f02ef564fd2e147d06eb9d8ab44
MD5 hash:
95955f84fedd9d7cb867638e65f6911b
SHA1 hash:
49ab9fbe607129d70702cee541133002b3b9e15b
Detections:
MALWARE_Win_RedLine SUSP_Imphash_Mar23_2 INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs RedLine_a
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer_V2
Author:Varp0s
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SUSP_Imphash_Mar23_2
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
Reference:Internal Research
Rule name:Windows_Trojan_RedLineStealer_4df4bcb6
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_f07b3cb4
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_f54632eb
Author:Elastic Security
Rule name:win_mofksys_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.mofksys.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AveMariaRAT

Executable exe 52de83987941b92875cecdd1661cc2757eae4f02ef564fd2e147d06eb9d8ab44

(this sample)

  
Delivery method
Distributed via web download

Comments