MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 258e62e8aaed5cfbb6f02777162fa7b6d951e0c1062d60e99e2052f34404c27f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 7 File information Comments

SHA256 hash: 258e62e8aaed5cfbb6f02777162fa7b6d951e0c1062d60e99e2052f34404c27f
SHA3-384 hash: 69e7226b1bebf2a5058988d7eef9c9f161bb38356f8d62cb3baee03561f69910a118584edba7f43556081eeedcb02995
SHA1 hash: d23e389eee7d33f058012dba3a0afc82bcfb2384
MD5 hash: 01a44c9eba0b0597a67a3912026a1438
humanhash: september-emma-asparagus-twelve
File name:258e62e8aaed5cfbb6f02777162fa7b6d951e0c1062d60e99e2052f34404c27f
Download: download sample
Signature AveMariaRAT
File size:1'931'038 bytes
First seen:2021-08-31 06:44:17 UTC
Last seen:2021-08-31 06:45:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7be4c98eebb39d282cdffc1cea8fb470 (661 x AveMariaRAT, 29 x Riskware.Generic)
ssdeep 12288:t99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSGN/A7W2FeDSIGVH/KIDgh:X1gg4CppEI6GGfWDkCQDbGV6eH81kE
Threatray 5'463 similar samples on MalwareBazaar
TLSH T15A958DE16300241BC66339B9EC4FE17844E2BD6A150477DE3B6B3EA86D6F3C27C96152
dhash icon a2888adabcaed2ea (6 x AveMariaRAT, 1 x Formbook)
Reporter JAMESWT_WT
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
258e62e8aaed5cfbb6f02777162fa7b6d951e0c1062d60e99e2052f34404c27f
Verdict:
Malicious activity
Analysis date:
2021-08-31 06:44:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a file
Launching a process
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Creating a process with a hidden window
Enabling the 'hidden' option for files in the %temp% directory
Deleting a recently created file
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Unauthorized injection to a system process
Result
Threat name:
AveMaria UACMe
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Contains functionality to hide user accounts
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Spreads via windows shares (copies files to share folders)
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected AveMaria stealer
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 474728 Sample: q25IQ0ALbl Startdate: 31/08/2021 Architecture: WINDOWS Score: 100 147 Malicious sample detected (through community Yara rule) 2->147 149 Antivirus detection for dropped file 2->149 151 Antivirus / Scanner detection for submitted sample 2->151 153 9 other signatures 2->153 11 q25IQ0ALbl.exe 1 51 2->11         started        14 StikyNot.exe 46 2->14         started        16 SyncHost.exe 2->16         started        18 6 other processes 2->18 process3 dnsIp4 165 Detected unpacking (changes PE section rights) 11->165 167 Spreads via windows shares (copies files to share folders) 11->167 169 Writes to foreign memory regions 11->169 181 3 other signatures 11->181 21 q25IQ0ALbl.exe 1 3 11->21         started        25 diskperf.exe 5 11->25         started        171 Allocates memory in foreign processes 14->171 173 Injects a PE file into a foreign processes 14->173 27 StikyNot.exe 14->27         started        29 diskperf.exe 14->29         started        175 Antivirus detection for dropped file 16->175 177 Machine Learning detection for dropped file 16->177 179 Sample uses process hollowing technique 16->179 103 127.0.0.1 unknown unknown 18->103 105 192.168.2.1 unknown unknown 18->105 signatures5 process6 file7 83 C:\Windows\System\explorer.exe, PE32 21->83 dropped 155 Installs a global keyboard hook 21->155 31 explorer.exe 47 21->31         started        85 C:\Users\user\...\Disk.sys:Zone.Identifier, ASCII 25->85 dropped 87 C:\Users\...\SyncHost.exe:Zone.Identifier, ASCII 25->87 dropped 89 C:\Users\...\StikyNot.exe:Zone.Identifier, ASCII 25->89 dropped 35 StikyNot.exe 46 25->35         started        signatures8 process9 file10 99 C:\Users\user\AppData\Local\Temp\Disk.sys, PE32 31->99 dropped 101 C:\Users\user\AppData\Local\...\SyncHost.exe, PE32 31->101 dropped 113 Antivirus detection for dropped file 31->113 115 System process connects to network (likely due to code injection or exploit) 31->115 117 Machine Learning detection for dropped file 31->117 125 5 other signatures 31->125 37 explorer.exe 3 17 31->37         started        42 diskperf.exe 31->42         started        119 Detected unpacking (changes PE section rights) 35->119 121 Spreads via windows shares (copies files to share folders) 35->121 123 Writes to foreign memory regions 35->123 44 StikyNot.exe 35->44         started        46 diskperf.exe 35->46         started        signatures11 process12 dnsIp13 107 googlecode.l.googleusercontent.com 172.217.218.82, 49706, 49707, 49710 GOOGLEUS United States 37->107 109 vccmd03.googlecode.com 37->109 111 4 other IPs or domains 37->111 91 C:\Windows\System\spoolsv.exe, PE32 37->91 dropped 93 C:\Users\user\AppData\Roaming\mrsys.exe, PE32 37->93 dropped 157 System process connects to network (likely due to code injection or exploit) 37->157 159 Creates an undocumented autostart registry key 37->159 161 Installs a global keyboard hook 37->161 48 spoolsv.exe 46 37->48         started        51 spoolsv.exe 46 37->51         started        53 spoolsv.exe 46 37->53         started        57 3 other processes 37->57 163 Drops executables to the windows directory (C:\Windows) and starts them 44->163 55 explorer.exe 44->55         started        file14 signatures15 process16 signatures17 127 Antivirus detection for dropped file 48->127 129 Detected unpacking (changes PE section rights) 48->129 131 Machine Learning detection for dropped file 48->131 133 Drops PE files with benign system names 48->133 59 spoolsv.exe 48->59         started        63 diskperf.exe 48->63         started        135 Spreads via windows shares (copies files to share folders) 51->135 137 Writes to foreign memory regions 51->137 139 Allocates memory in foreign processes 51->139 65 spoolsv.exe 51->65         started        67 diskperf.exe 51->67         started        141 Injects a PE file into a foreign processes 53->141 69 spoolsv.exe 53->69         started        71 diskperf.exe 53->71         started        143 Sample uses process hollowing technique 55->143 145 Drops executables to the windows directory (C:\Windows) and starts them 57->145 73 spoolsv.exe 57->73         started        75 spoolsv.exe 57->75         started        process18 file19 95 C:\Windows\System\svchost.exe, PE32 59->95 dropped 183 Installs a global keyboard hook 59->183 77 svchost.exe 59->77         started        185 Drops executables to the windows directory (C:\Windows) and starts them 65->185 81 svchost.exe 65->81         started        signatures20 process21 file22 97 C:\Users\user\AppData\Local\...\StikyNot.exe, PE32 77->97 dropped 187 Antivirus detection for dropped file 77->187 189 Machine Learning detection for dropped file 77->189 191 Spreads via windows shares (copies files to share folders) 77->191 193 Sample uses process hollowing technique 81->193 195 Injects a PE file into a foreign processes 81->195 signatures23
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2021-08-21 14:18:38 UTC
File Type:
PE (Exe)
Extracted files:
63
AV detection:
44 of 46 (95.65%)
Threat level:
  2/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat evasion infostealer persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Modifies Installed Components in the registry
Warzone RAT Payload
Modifies WinLogon for persistence
Modifies visiblity of hidden/system files in Explorer
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
258e62e8aaed5cfbb6f02777162fa7b6d951e0c1062d60e99e2052f34404c27f
MD5 hash:
01a44c9eba0b0597a67a3912026a1438
SHA1 hash:
d23e389eee7d33f058012dba3a0afc82bcfb2384
Detections:
win_ave_maria_g0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AveMaria
Author:@bartblaze
Description:Identifies AveMaria aka WarZone RAT.
Rule name:ave_maria_warzone_rat
Author:jeFF0Falltrades
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:MALWARE_Win_AveMaria
Author:ditekSHen
Description:AveMaria variant payload
Rule name:MALWARE_Win_WarzoneRAT
Author:ditekSHen
Description:Detects AveMaria/WarzoneRAT
Rule name:RDPWrap
Author:@bartblaze
Description:Identifies RDP Wrapper, sometimes used by attackers to maintain persistence.
Reference:https://github.com/stascorp/rdpwrap

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments