MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3cac6c728bcd37d6b403146bbee3c1f039cf166e3b832df9021bf03beeb72227. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 11


Maldoc score: 12


Intelligence 11 IOCs YARA 17 File information Comments

SHA256 hash: 3cac6c728bcd37d6b403146bbee3c1f039cf166e3b832df9021bf03beeb72227
SHA3-384 hash: 49f4684e9857714b6558b38839a102fcc28b361a9e71e4797f133d689fceda32b7dca85a8859262446d2e8f2fadb1cd1
SHA1 hash: 637e93a02e3845bd299cc978d2d4274c24a73bcd
MD5 hash: 88825b57c917fe19a6fd917c356716be
humanhash: cold-one-twelve-missouri
File name:Purchase Orders - Foreign_000000000058560.doc
Download: download sample
Signature AveMariaRAT
File size:336'896 bytes
First seen:2021-03-10 12:19:44 UTC
Last seen:2021-03-10 13:45:51 UTC
File type:Word file doc
MIME type:application/msword
ssdeep 3072:bxL6I835XtEkDwxddfOmRQQT5WNKVKq2EFq467syADUqb6Wpnb8iOJDm+3nda1kp:Zb8dtEk8VXSQToNKVwE1ifLc1nb8rmC
TLSH B9646934F3E7CB52C747463E027EBD3B27655AC92AC0844B20972E196972F729643A7C
Reporter abuse_ch
Tags:AveMariaRAT doc RAT


Avatar
abuse_ch
Malspam distributing AveMariaRAT:

HELO: ermis.hcg.gr
Sending IP: 84.205.254.49
From: Ulrich Külzer / HARTON Anlagentechnik GmbH <nnouskas@hcg.gr>
Reply-To: Ulrich Külzer / HARTON Anlagentechnik GmbH <nnouskas@hcg.gr>
Subject: Purchase Orders - Foreign_000000000088907
Attachment: Purchase Orders - Foreign_000000000058560.doc

AveMariaRAT payload URLs:
http://165.22.91.233/doc/newone
http://165.22.91.233/file/doc.exe

AveMariaRAT C2:
137.116.87.64:8400

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 12
Application name is Microsoft Office Word
Office document is in OLE format
Office document contains VBA Macros
OLE dump

MalwareBazaar was able to identify 20 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
47083 bytes1Table
5297197 bytesData
6499 bytesMacros/PROJECT
786 bytesMacros/PROJECTwm
81674 bytesMacros/VBA/ThisDocument
93233 bytesMacros/VBA/_VBA_PROJECT
102057 bytesMacros/VBA/__SRP_0
11182 bytesMacros/VBA/__SRP_1
12519 bytesMacros/VBA/__SRP_2
13216 bytesMacros/VBA/__SRP_3
14846 bytesMacros/VBA/dir
151385 bytesMacros/VBA/rttrtrhthtryyy
1697 bytesMacros/rttrtrhthtryyy/CompObj
17297 bytesMacros/rttrtrhthtryyy/VBFrame
18110 bytesMacros/rttrtrhthtryyy/f
19220 bytesMacros/rttrtrhthtryyy/o
204096 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDOCUMenT_opeNRuns when the Word or Publisher document is opened
AutoExecOptionButtoffgfdgdfgRuns when the file is opened and ActiveX objects trigger events
IOC165.22.91.233IPv4 address
IOCOptionButton1ocuRUNdExecutable file name
SuspiciousShellMay run an executable file or a system command
SuspiciousvbHideMay run an executable file or a system command
SuspiciousGetObjectMay get an OLE object with a running instance
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciouswriteMay write to a file (if combined with Open)

Intelligence


File Origin
# of uploads :
2
# of downloads :
128
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Purchase Orders - Foreign_000000000058560.doc
Verdict:
Malicious activity
Analysis date:
2021-03-10 12:25:50 UTC
Tags:
macros macros-on-open loader trojan stealer rat avemaria

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process with a hidden window
Sending an HTTP GET request
Launching cmd.exe command interpreter
Creating a file in the %AppData% directory
Creating a process from a recently created file
Launching a process by exploiting the app vulnerability
Launching a file downloaded from the Internet
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Payload URLs
URL
File name
Project.ThisDocument.DOCUMenT_opeN
1Table
Document image
Document image
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
IPv4 Dotted Quad URL
A URL was detected referencing a direct IP address, as opposed to a domain name.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
InQuest Machine Learning
An InQuest machine-learning model classified this macro as potentially malicious.
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to hide user accounts
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: rundll32 run dll from internet
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM_3
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 366149 Sample: Purchase Orders - Foreign_0... Startdate: 10/03/2021 Architecture: WINDOWS Score: 100 50 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for URL or domain 2->54 56 13 other signatures 2->56 10 WINWORD.EXE 436 30 2->10         started        process3 signatures4 62 Document exploit detected (process start blacklist hit) 10->62 13 rundll32.exe 12 10->13         started        process5 dnsIp6 42 165.22.91.23 DIGITALOCEAN-ASNUS United States 13->42 44 165.22.91.233, 49165, 49166, 80 DIGITALOCEAN-ASNUS United States 13->44 64 System process connects to network (likely due to code injection or exploit) 13->64 66 PowerShell case anomaly found 13->66 17 cmd.exe 13->17         started        signatures7 process8 signatures9 46 Encrypted powershell cmdline option found 17->46 48 PowerShell case anomaly found 17->48 20 powershell.exe 12 7 17->20         started        process10 file11 36 C:\Users\user\AppData\...\rgergbrebree.exe, PE32 20->36 dropped 58 Powershell drops PE file 20->58 24 rgergbrebree.exe 3 20->24         started        signatures12 process13 file14 38 C:\Users\user\AppData\...\ANSTmeYXgGZy.exe, PE32 24->38 dropped 40 C:\Users\user\AppData\Local\...\tmpFD82.tmp, XML 24->40 dropped 60 Machine Learning detection for dropped file 24->60 28 schtasks.exe 24->28         started        30 rgergbrebree.exe 24->30         started        32 rgergbrebree.exe 24->32         started        34 3 other processes 24->34 signatures15 process16
Gathering data
Threat name:
Document-Office.Trojan.Woreflint
Status:
Malicious
First seen:
2021-03-10 12:20:18 UTC
AV detection:
6 of 47 (12.77%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat infostealer macro rat
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
Warzone RAT Payload
Process spawned unexpected child process
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
137.116.87.64:8400
Dropper Extraction:
http://165.22.91.233/file/doc.exe
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AveMaria
Author:@bartblaze
Description:Identifies AveMaria aka WarZone RAT.
Rule name:AveMaria_WarZone
Rule name:ave_maria_warzone_rat
Author:jeFF0Falltrades
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Codoso_Gh0st_2
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_AveMaria
Author:ditekSHen
Description:AveMaria variant payload
Rule name:MALWARE_Win_WarzoneRAT
Author:ditekSHen
Description:Detects AveMaria/WarzoneRAT
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:RDPWrap
Author:@bartblaze
Description:Identifies RDP Wrapper, sometimes used by attackers to maintain persistence.
Reference:https://github.com/stascorp/rdpwrap
Rule name:Stealer_word_in_memory
Author:James_inthe_box
Description:The actual word stealer in memory
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AveMariaRAT

Word file doc 3cac6c728bcd37d6b403146bbee3c1f039cf166e3b832df9021bf03beeb72227

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments