MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0269f5e35d84ded93ff37de9a062418de6f910f5a786806157f1a406143e83e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 0269f5e35d84ded93ff37de9a062418de6f910f5a786806157f1a406143e83e2
SHA3-384 hash: f85b8bd80062c00ce358036e1db0a69b7f07e234d4acc11518cafba6f1439ded23f6dee40ba0b96e3157b61a1ade2c99
SHA1 hash: 1e03f42622491e8bbf6bb8aa864a5e2d71aba35b
MD5 hash: 5168a23cef0ff40ceb225f3a7c7e1e3f
humanhash: oklahoma-green-edward-freddie
File name:Scan IMG-Revised_New order _ Mackson Quote.exe
Download: download sample
Signature AveMariaRAT
File size:852'480 bytes
First seen:2022-06-23 13:42:33 UTC
Last seen:2022-06-30 08:55:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c76d99eb1fc8983eeabad44693e9e405 (1 x RemcosRAT, 1 x AveMariaRAT)
ssdeep 12288:bKylK+VTH3S6FceOfkiOe4fx+PA/9c7B6hcSwu7:bTrnq9+e4fk+aB6+y
TLSH T128057D66B291C433C0F319799D5F63A99D27BE102E2879466BF12C4DBE39781383D287
TrID 61.1% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
24.1% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
10.7% (.OCX) Windows ActiveX control (116521/4/18)
1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.2% (.SCR) Windows screen saver (13101/52/3)
File icon (PE):PE icon
dhash icon 74f08889868e88b4 (13 x RemcosRAT, 4 x AveMariaRAT, 2 x ModiLoader)
Reporter James_inthe_box
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
247
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the process to interact with network services
Launching a process
Unauthorized injection to a recently created process
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the Program Files subdirectories
Launching a service
Launching the process to change the firewall settings
Sending a UDP request
Loading a system driver
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
babar keylogger
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Generic
Status:
Suspicious
First seen:
2022-06-23 01:42:57 UTC
File Type:
PE (Exe)
Extracted files:
54
AV detection:
4 of 41 (9.76%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
avemaria
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:modiloader family:warzonerat collection evasion infostealer persistence rat spyware stealer trojan upx
Behaviour
Modifies system certificate store
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Accesses Microsoft Outlook profiles
Adds Run key to start application
Modifies WinLogon
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
ModiLoader Second Stage
Warzone RAT Payload
ModiLoader, DBatLoader
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
0b4b7d7628499c9d0c62562dc64f22baf5390cd32f71e0317c259511ae85b5b6
MD5 hash:
d6e8fb9c9383709a7475144fbc74cb44
SHA1 hash:
3dc32f98eb13d725511b64924730132883ad3591
SH256 hash:
0269f5e35d84ded93ff37de9a062418de6f910f5a786806157f1a406143e83e2
MD5 hash:
5168a23cef0ff40ceb225f3a7c7e1e3f
SHA1 hash:
1e03f42622491e8bbf6bb8aa864a5e2d71aba35b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments