MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2278d1bca473d91247e01794a1202297bda4bce23c3a1e74c43abc67d8d7b371. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 12
| SHA256 hash: | 2278d1bca473d91247e01794a1202297bda4bce23c3a1e74c43abc67d8d7b371 |
|---|---|
| SHA3-384 hash: | 1ce4de2324bcb127d9be1a99dbd78d111bda00deda1c6fa06243978ced02da56a1b1c39843ab913be207e01fc4dd7fe4 |
| SHA1 hash: | 277d9f69e0698f248222d53e029b198b5370d14d |
| MD5 hash: | 1ef419923a2023c3cb30fa7b844e71d8 |
| humanhash: | comet-bacon-comet-uranus |
| File name: | Samsung-Galaxy-Video-Keller.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 294'912 bytes |
| First seen: | 2022-10-19 02:37:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner) |
| ssdeep | 6144:8BlkZvaF4NTB0Ilv6pceeqYa+5d69kVrKwIpeVRnbUbf0yiyvXN:8oSWNT+IUpIbhkOqJF |
| Threatray | 2'970 similar samples on MalwareBazaar |
| TLSH | T11F549D211AA2899BD1512F7800B0B76E827A5FE07D3AE797DF2134D1AF32BC539752D0 |
| TrID | 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 12.7% (.EXE) Win64 Executable (generic) (10523/12/4) 7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 677737333723e564 (1 x AveMariaRAT) |
| Reporter | |
| Tags: | AveMariaRAT exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
249
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Samsung-Galaxy-Video-Keller.exe
Verdict:
Malicious activity
Analysis date:
2022-10-19 06:24:41 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Forced system process termination
Launching a process
Sending an HTTP GET request
Creating a file
Using the Windows Management Instrumentation requests
Modifying a system executable file
Launching cmd.exe command interpreter
Launching a tool to kill processes
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
AveMaria, Babadeda, UACMe
Detection:
malicious
Classification:
phis.troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Contains functionality to hide user accounts
Creates files in alternative data streams (ADS)
Drops script or batch files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Yara detected AveMaria stealer
Yara detected Babadeda
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-10-19 02:57:57 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
15 of 26 (57.69%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 2'960 additional samples on MalwareBazaar
Result
Malware family:
warzonerat
Score:
10/10
Tags:
family:warzonerat infostealer persistence rat upx
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Kills process with taskkill
Modifies registry class
NTFS ADS
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Enumerates connected drives
Drops startup file
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Modifies Installed Components in the registry
UPX packed file
Warzone RAT payload
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
111.90.151.174:5200
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
746def02c12f9de40dc1464fa600c15cb4c3255d4d3b45666c16ae0d8add3dc1
MD5 hash:
8886881900b86003b74cfc7d1a919b67
SHA1 hash:
8b9644a56de2e761d5c4936636e40e42989d8255
SH256 hash:
e65fed2a44571cfe7b9de30854d222b7cd8018fcc12a8245c89d2846cf7ecd43
MD5 hash:
92f9e25e2a3617af67c9fdfbc129f1ba
SHA1 hash:
f5cd0f219e36ad2f77addf621e7cf631fece46bf
SH256 hash:
66bb0d8edc8527108351ce059571b0c456be4229271c09ca1e2ea6674e246d56
MD5 hash:
c96f9efe3dad406691ab989b06a76de7
SHA1 hash:
cb45f2cc833facc27812883ce2a3f90155bed5cb
SH256 hash:
10d5e7445b2bf28bbde997822e4166d1d31b80082ddc43e012784f8d74f7260e
MD5 hash:
ba36d9cf77c85b3a392acced001e175c
SHA1 hash:
ba3170ba81e64519662537982b96f438c84f8146
SH256 hash:
0f3c3c491bfe14f9da65590630cde9ab0f871d8b769a93b8dc8cfd488911f1f8
MD5 hash:
1e4b4b7ab1d6044e3817835982e22864
SHA1 hash:
4749feacae9f54563f73d6614344e469a32bf3c2
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
2278d1bca473d91247e01794a1202297bda4bce23c3a1e74c43abc67d8d7b371
MD5 hash:
1ef419923a2023c3cb30fa7b844e71d8
SHA1 hash:
277d9f69e0698f248222d53e029b198b5370d14d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.