MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36c35b4364b62c4d1ff2be1e1a043a10bc587625ad383dd2b4dacde157a952e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 36c35b4364b62c4d1ff2be1e1a043a10bc587625ad383dd2b4dacde157a952e4
SHA3-384 hash: 82f968a11f64dd24039309248e7785dfda007b1773115c992f508953a7e8d0319cdc4dba86d8263fe8c1648eb1e4166a
SHA1 hash: c9cea20f2c364b0fac333df91b58c6425193d2f9
MD5 hash: 2b41a99cdf2d243256bf5950dcbc38b8
humanhash: hot-lima-sodium-artist
File name:2b41a99cdf2d243256bf5950dcbc38b8.exe
Download: download sample
Signature AveMariaRAT
File size:696'832 bytes
First seen:2021-08-01 06:59:33 UTC
Last seen:2021-08-02 11:37:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:EqTK7iS/d348SkQQSY93bnE2W+RhWMhNxzJeB2l3h1v30ob3fIKSt:rhS/d3ckJbE29RhHH3vEA3flE
Threatray 1'628 similar samples on MalwareBazaar
TLSH T162E4CF7485CCEBEADC9C03791F8C03643EF18896E1B1E5603E4956F1E5C1E69EAB9702
Reporter abuse_ch
Tags:AveMariaRAT exe RAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'361
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2b41a99cdf2d243256bf5950dcbc38b8.exe
Verdict:
Malicious activity
Analysis date:
2021-08-01 07:01:41 UTC
Tags:
trojan stealer rat avemaria

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AveMaria Snake Keylogger
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (creates a PE file in dynamic memory)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides user accounts
Increases the number of concurrent connection per server for Internet Explorer
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AveMaria stealer
Yara detected Snake Keylogger
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 457447 Sample: DyxL4y2hv3.exe Startdate: 01/08/2021 Architecture: WINDOWS Score: 100 90 Malicious sample detected (through community Yara rule) 2->90 92 Antivirus detection for URL or domain 2->92 94 Multi AV Scanner detection for dropped file 2->94 96 8 other signatures 2->96 11 DyxL4y2hv3.exe 3 2->11         started        15 tsusbhub.sys 3 2->15         started        17 rdpdr.sys 8 2->17         started        19 rdpvideominiport.sys 4 2->19         started        process3 file4 72 C:\Users\user\AppData\...\DyxL4y2hv3.exe.log, ASCII 11->72 dropped 118 Contains functionality to inject threads in other processes 11->118 120 Contains functionality to steal Chrome passwords or cookies 11->120 122 Contains functionality to steal e-mail passwords 11->122 124 Injects a PE file into a foreign processes 11->124 21 DyxL4y2hv3.exe 4 5 11->21         started        25 DyxL4y2hv3.exe 11->25         started        signatures5 process6 file7 68 C:\ProgramData\images.exe, PE32 21->68 dropped 70 C:\ProgramData\images.exe:Zone.Identifier, ASCII 21->70 dropped 114 Increases the number of concurrent connection per server for Internet Explorer 21->114 116 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->116 27 images.exe 3 21->27         started        31 cmd.exe 1 21->31         started        signatures8 process9 file10 74 C:\Users\user\AppData\...\images.exe.log, ASCII 27->74 dropped 126 Multi AV Scanner detection for dropped file 27->126 128 Detected unpacking (creates a PE file in dynamic memory) 27->128 130 Machine Learning detection for dropped file 27->130 132 4 other signatures 27->132 33 images.exe 5 23 27->33         started        38 images.exe 27->38         started        40 images.exe 27->40         started        42 reg.exe 1 1 31->42         started        44 conhost.exe 31->44         started        signatures11 process12 dnsIp13 80 hutyrtit.ydns.eu 203.159.80.165, 49726, 49727, 6703 LOVESERVERSGB Netherlands 33->80 82 sdafsdffssffs.ydns.eu 33->82 62 C:\Users\user\AppData\Roaming\pxixlgABA.exe, PE32 33->62 dropped 64 C:\Users\user\AppData\Local\...\microC[1].exe, PE32 33->64 dropped 66 C:\Program Files\Microsoft DN1\sqlmap.dll, PE32+ 33->66 dropped 98 Hides user accounts 33->98 100 Writes to foreign memory regions 33->100 102 Allocates memory in foreign processes 33->102 106 2 other signatures 33->106 46 pxixlgABA.exe 6 33->46         started        50 cmd.exe 1 33->50         started        104 Creates an undocumented autostart registry key 42->104 file14 signatures15 process16 file17 76 C:\Users\user\AppData\...\qfwGDayzyESzj.exe, PE32 46->76 dropped 78 C:\Users\user\AppData\Local\...\tmpA7ED.tmp, XML 46->78 dropped 134 Multi AV Scanner detection for dropped file 46->134 136 May check the online IP address of the machine 46->136 138 Machine Learning detection for dropped file 46->138 140 2 other signatures 46->140 52 pxixlgABA.exe 15 5 46->52         started        56 schtasks.exe 1 46->56         started        58 conhost.exe 50->58         started        signatures18 process19 dnsIp20 84 checkip.dyndns.com 132.226.247.73, 49737, 80 UTMEMUS United States 52->84 86 api.telegram.org 149.154.167.220, 443, 49739 TELEGRAMRU United Kingdom 52->86 88 2 other IPs or domains 52->88 108 Tries to steal Mail credentials (via file access) 52->108 110 Tries to harvest and steal ftp login credentials 52->110 112 Tries to harvest and steal browser information (history, passwords, etc) 52->112 60 conhost.exe 56->60         started        signatures21 process22
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-01 01:47:06 UTC
AV detection:
18 of 46 (39.13%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat infostealer persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Modifies WinLogon
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Sets DLL path for service in the registry
CustAttr .NET packer
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
sdafsdffssffs.ydns.eu:6703
Unpacked files
SH256 hash:
fb55340ef36d5bfae56dd84e51b9aff7996ab7428fd1fcbe53dfb8fdcda244e8
MD5 hash:
b858a1f896ba459493486676e59af5ad
SHA1 hash:
c8a0ba42f8076b5c2b0d4cd2e0e6225b509b9f0c
Detections:
win_ave_maria_g0 win_ave_maria_auto
SH256 hash:
477cab8d4385172d679200edc6619462de2402d912f21f36981fc058987a6d52
MD5 hash:
16a9ddc4b32981114fe4f069a4353105
SHA1 hash:
bf73849f57c150f9e2199c61427f631be2dfa595
SH256 hash:
d24599e241e196a52d09182e07ad6bbb6c60caac421900c97c8cabb184daa4b2
MD5 hash:
45b59dea118236ebed8ecb38bd6050da
SHA1 hash:
65255dd72b20bb0ae91fdeb8a2c42802321db011
SH256 hash:
97d2fa1d01b2f9a2199896e05e0cf60c14a9f41ef2d72e15fbb862b7afa08438
MD5 hash:
68463851c0e6fe7a254c99fae763d454
SHA1 hash:
4587a5371d88c296a0184fe47ee0c5245b187127
SH256 hash:
f71d97c3d42af0eb4cc74e640a995eb0f288bab59b7be5cd89eccb21cd304f36
MD5 hash:
6c72218c48cd68cbcb654675053a0abb
SHA1 hash:
12207fa32070f99683648d87b44410e5d3cdf2de
SH256 hash:
36c35b4364b62c4d1ff2be1e1a043a10bc587625ad383dd2b4dacde157a952e4
MD5 hash:
2b41a99cdf2d243256bf5950dcbc38b8
SHA1 hash:
c9cea20f2c364b0fac333df91b58c6425193d2f9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AveMariaRAT

Executable exe 36c35b4364b62c4d1ff2be1e1a043a10bc587625ad383dd2b4dacde157a952e4

(this sample)

  
Delivery method
Distributed via web download

Comments