MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fb8aef0f4faaf86fed3ed65eb84b8a1a5b3a50605e5f4e6f341de33e898d3775. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fb8aef0f4faaf86fed3ed65eb84b8a1a5b3a50605e5f4e6f341de33e898d3775
SHA3-384 hash: e70f82a57d7c8771521d48b1f1823612a983fb9f8495ddce76427e6fda67e2e84b584dc213fb8b73b9c1861b4ebedff9
SHA1 hash: e955361051e157bbc9c48840f071b52bee3a9e5c
MD5 hash: 0db8d65654edb74ae9a691e8ad95f632
humanhash: twenty-east-kilo-potato
File name:fb8aef0f4faaf86fed3ed65eb84b8a1a5b3a50605e5f4e6f341de33e898d3775
Download: download sample
File size:5'613'194 bytes
First seen:2020-07-06 06:35:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6bac3cfe8acb6c6c4a30aaa022de2388 (308 x AveMariaRAT, 7 x njrat, 7 x Skeeeyah)
ssdeep 49152:fF6mw4gxeOw46fUbNecCCFbNecLF6mw4gxeOw46fUbNecCCFbNecr:969xZw46G8q8K69xZw46G8q8w
Threatray 1'654 similar samples on MalwareBazaar
TLSH E5469EC0797E4887E9335672610F9A119988FC3E8780EBA76F377D4685CB182E58734B
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Forced system process termination
Creating a window
Creating a file in the %temp% directory
Creating a file
Launching a process
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with Startup directory
Unauthorized injection to a system process
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2020-06-24 00:37:47 UTC
File Type:
PE (Exe)
Extracted files:
31
AV detection:
25 of 27 (92.59%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments