MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0d38ea72059443a96e979d8669d1eb95be5863beb8459ef4d408417c3e823484. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 4
| SHA256 hash: | 0d38ea72059443a96e979d8669d1eb95be5863beb8459ef4d408417c3e823484 |
|---|---|
| SHA3-384 hash: | 62c50366c408925ec9830089eb143f0ebfbd1d55352a4f6b4e045cdea2811a0ded54211f5a9272ee4c1dbc4b2e294400 |
| SHA1 hash: | 003c911960d606eaf13bd26579aa15ca027344d2 |
| MD5 hash: | edbf02a1ca1a153f4a0274b6a4ba52e1 |
| humanhash: | summer-ceiling-paris-victor |
| File name: | e11c962c564678430583982c79947a99.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 103'936 bytes |
| First seen: | 2020-03-30 03:30:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 879635b629affd65258851469f9bf6f9 (31 x AveMariaRAT) |
| ssdeep | 1536:lvqIPE8ddFD1frrq7gVxoNGPNJKF1m+xVE0/bKM:cI8CxFVxAMNJKu+xVE0TKM |
| Threatray | 423 similar samples on MalwareBazaar |
| TLSH | 77A39D2377D14439F67102B02CB97F79CABFBE380221855BD72456876B31994EA363A3 |
| Reporter | |
| Tags: | AveMariaRAT exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=1boC4iE-cB85KxGFqXp7XyEv8UYq-2Y0C
Intelligence
File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Antiav
Status:
Malicious
First seen:
2020-03-30 03:35:22 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
40 of 47 (85.11%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
avemaria
Similar samples:
+ 413 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropped by
MD5 9329537e60f117d07a2f3fb0dbd4c9ae
Dropped by
GuLoader
Dropped by
SHA256 bd726690fc31889a77d0f1ecd06f631a8c18de7f0d3002f730627d25c274c2ab
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::FreeSid ADVAPI32.dll::InitializeSecurityDescriptor |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CoInitializeSecurity |
| DP_API | Uses DP API | CRYPT32.dll::CryptUnprotectData |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::SetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW SHELL32.dll::ShellExecuteExA SHELL32.dll::ShellExecuteExW |
| URL_MONIKERS_API | Can Download & Execute components | urlmon.dll::URLDownloadToFileW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateRemoteThread KERNEL32.dll::CreateProcessW KERNEL32.dll::CreateProcessA KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken KERNEL32.dll::VirtualAllocEx |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WinExec |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW SHELL32.dll::SHCreateDirectoryExW KERNEL32.dll::CreateFileW KERNEL32.dll::CreateFileA KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::LookupAccountSidW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExA ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyA ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExA ADVAPI32.dll::RegOpenKeyExW |
| WIN_SOCK_API | Uses Network to send and receive data | WS2_32.dll::freeaddrinfo WS2_32.dll::getaddrinfo WS2_32.dll::InetNtopW |
| WIN_SVC_API | Can Manipulate Windows Services | ADVAPI32.dll::ChangeServiceConfigW ADVAPI32.dll::OpenSCManagerW ADVAPI32.dll::OpenServiceW ADVAPI32.dll::QueryServiceConfigW ADVAPI32.dll::StartServiceW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.