MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb23c3f365a86ea3c8fbebc5d31d63ad9701de26aae4274f34d0b3ab7dbe6eb8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: bb23c3f365a86ea3c8fbebc5d31d63ad9701de26aae4274f34d0b3ab7dbe6eb8
SHA3-384 hash: c31a09a92d539cddc03910393e392ca52a95978f490d1be8d06cfae3cfffd70434c53ff6d234534194a367d5a93d2a60
SHA1 hash: d39d27cbdf7b468f19a529b5603022556a25fcaf
MD5 hash: 12b6a770eae7264e1aa1d7d5c70747af
humanhash: oscar-butter-fix-utah
File name:RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.z
Download: download sample
Signature AveMariaRAT
File size:465'481 bytes
First seen:2020-07-08 06:38:23 UTC
Last seen:Never
File type: z
MIME type:application/x-rar
ssdeep 12288:87tRoP2fjp4z5vWORSseD33xGZRsEz58CxrqPol4/eGv:8voP2byz5vhRSRUZT5Nxm6eeGv
TLSH B4A423875F55C54B1DD318A65E0DE409A0880FA38563532CC7EAFCBCECEADB5160EB92
Reporter abuse_ch
Tags:AveMariaRAT RAT z


Avatar
abuse_ch
Malspam distributing AveMariaRAT:

HELO: smtp4.hiworks.co.kr
Sending IP: 121.254.168.203
From: sp002@ksmps.co.kr <sp002@ksmps.co.kr>
Subject: RFP NDT SERVICES/EQUIPMENT - NON-DESTRUCTIVE TESTING PROJECT 2020
Attachment: RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.z (contains "RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.exe")

AveMariaRAT C2:
172.93.189.85:5200

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2020-07-08 06:40:07 UTC
AV detection:
1 of 48 (2.08%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AveMariaRAT

z bb23c3f365a86ea3c8fbebc5d31d63ad9701de26aae4274f34d0b3ab7dbe6eb8

(this sample)

  
Dropping
AveMariaRAT
  
Delivery method
Distributed via e-mail attachment

Comments