MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cd33ac9da8f03275a8921f357d40f64d5004fe7bc836ba90d8c65bab409b2a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 0cd33ac9da8f03275a8921f357d40f64d5004fe7bc836ba90d8c65bab409b2a9
SHA3-384 hash: a6c75b646f879e9506390416d8ae073659cade1c17a96a335c792a6108dedaa0df85e037b875fd2e469481b6a1b2cb66
SHA1 hash: 62e965b0fb8cc24ff6e7fa4e5f7c2786ce144b94
MD5 hash: ca745d9637baa2477bb12d6ed0e798a5
humanhash: high-utah-magnesium-wisconsin
File name:Purchase order.exe
Download: download sample
Signature AveMariaRAT
File size:691'200 bytes
First seen:2023-01-23 09:09:07 UTC
Last seen:2023-01-30 09:04:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:Qi0TacS4nMlcQ2mjMJbPng/8GIGO+F5IBRKYWTHbK5lF:Qip4qcQ+/GORu7+F
TLSH T1DFE4CF734BC23FA3E6345736DA93185817F096071016E7DBBEF805F946C6F8A6B2121A
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 1032d232e98c3689 (16 x AgentTesla, 8 x AveMariaRAT, 7 x Formbook)
Reporter adrian__luca
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
195
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
avemaria
ID:
1
File name:
Purchase order.exe
Verdict:
Malicious activity
Analysis date:
2023-01-23 09:17:28 UTC
Tags:
trojan stealer rat avemaria

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Creating a window
Running batch commands
Launching a process
Creating a file
Creating a file in the %AppData% directory
Creating a process from a recently created file
Enabling autorun
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
83%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AveMaria, DarkTortilla, UACMe
Detection:
malicious
Classification:
phis.troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Creates an undocumented autostart registry key
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides user accounts
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Increases the number of concurrent connection per server for Internet Explorer
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses netsh to modify the Windows network and firewall settings
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AveMaria stealer
Yara detected DarkTortilla Crypter
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 789548 Sample: Purchase order.exe Startdate: 23/01/2023 Architecture: WINDOWS Score: 100 96 Snort IDS alert for network traffic 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 Multi AV Scanner detection for dropped file 2->100 102 10 other signatures 2->102 11 Purchase order.exe 15 3 2->11         started        16 rdpvideominiport.sys 2->16         started        18 rdpdr.sys 2->18         started        20 tsusbhub.sys 2->20         started        process3 dnsIp4 88 www.google.com 142.250.203.100, 443, 49702, 49703 GOOGLEUS United States 11->88 78 C:\Users\user\...\Purchase order.exe.log, ASCII 11->78 dropped 116 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->116 22 cmd.exe 3 11->22         started        26 cmd.exe 1 11->26         started        file5 signatures6 process7 file8 74 C:\Users\user\AppData\Roaming\dzbbAsg.exe, PE32 22->74 dropped 76 C:\Users\user\...\dzbbAsg.exe:Zone.Identifier, ASCII 22->76 dropped 104 Uses ping.exe to sleep 22->104 28 dzbbAsg.exe 14 5 22->28         started        33 conhost.exe 22->33         started        35 PING.EXE 1 22->35         started        37 PING.EXE 1 22->37         started        106 Uses ping.exe to check the status of other devices and networks 26->106 39 reg.exe 1 1 26->39         started        41 PING.EXE 1 26->41         started        43 conhost.exe 26->43         started        signatures9 process10 dnsIp11 90 www.google.com 28->90 80 C:\Users\user\AppData\Local\...\BBfkkccR.exe, PE32 28->80 dropped 118 Multi AV Scanner detection for dropped file 28->118 120 Machine Learning detection for dropped file 28->120 122 Writes to foreign memory regions 28->122 126 2 other signatures 28->126 45 AddInProcess32.exe 8 27 28->45         started        50 BBfkkccR.exe 28->50         started        52 BBfkkccR.exe 28->52         started        54 3 other processes 28->54 124 Creates an undocumented autostart registry key 39->124 92 127.0.0.1 unknown unknown 41->92 file12 signatures13 process14 dnsIp15 94 185.246.220.237, 49710, 7134 LVLT-10753US Germany 45->94 82 C:\Users\user\AppData\Local\Temp\30.exe, PE32 45->82 dropped 84 C:\Program Files\Microsoft DN1\sqlmap.dll, PE32+ 45->84 dropped 128 Hides user accounts 45->128 130 Increases the number of concurrent connection per server for Internet Explorer 45->130 132 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->132 56 30.exe 45->56         started        134 Antivirus detection for dropped file 50->134 136 Multi AV Scanner detection for dropped file 50->136 138 Machine Learning detection for dropped file 50->138 60 BBfkkccR.exe 50->60         started        62 BBfkkccR.exe 52->62         started        64 BBfkkccR.exe 54->64         started        66 BBfkkccR.exe 54->66         started        file16 signatures17 process18 dnsIp19 86 239.255.255.250 unknown Reserved 56->86 108 Antivirus detection for dropped file 56->108 110 Multi AV Scanner detection for dropped file 56->110 112 Uses netsh to modify the Windows network and firewall settings 56->112 114 Modifies the windows firewall 56->114 68 netsh.exe 56->68         started        70 WerFault.exe 56->70         started        signatures20 process21 process22 72 conhost.exe 68->72         started       
Threat name:
ByteCode-MSIL.Trojan.Lazy
Status:
Malicious
First seen:
2023-01-23 09:10:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
22
AV detection:
20 of 25 (80.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
avemaria
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat evasion infostealer persistence rat upx
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
Sets DLL path for service in the registry
UPX packed file
Modifies WinLogon for persistence
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
0cd33ac9da8f03275a8921f357d40f64d5004fe7bc836ba90d8c65bab409b2a9
MD5 hash:
ca745d9637baa2477bb12d6ed0e798a5
SHA1 hash:
62e965b0fb8cc24ff6e7fa4e5f7c2786ce144b94
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AveMariaRAT

Executable exe 0cd33ac9da8f03275a8921f357d40f64d5004fe7bc836ba90d8c65bab409b2a9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments