MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3eeb2e2ce79a4ef273dd4abf33b96be6131d0bc519bcd96b9fe5aafbd504bc59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 11
| SHA256 hash: | 3eeb2e2ce79a4ef273dd4abf33b96be6131d0bc519bcd96b9fe5aafbd504bc59 |
|---|---|
| SHA3-384 hash: | 48fcd59c23ff6eceb04921dacfc5bb8f8c6a8b717b193b7fa1cb42a22310ec032f9b99fcd1a99957d984c5bb52af9ed4 |
| SHA1 hash: | 9c0c8898c17c1288bc3edf0b44b2309c5dabd68c |
| MD5 hash: | b2b4962fc5b8df755b981b8eee177ff2 |
| humanhash: | black-helium-sweet-carbon |
| File name: | b2b4962fc5b8df755b981b8eee177ff2.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 658'432 bytes |
| First seen: | 2021-07-20 15:12:45 UTC |
| Last seen: | 2021-07-20 15:53:17 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'665 x AgentTesla, 19'479 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:JvFWssZm5qy2FRbaXl+0z90M1r6O1hURtszrJzFtaTMrdAk:9ULRbklNh762hnJzFtaTMrdAk |
| Threatray | 1'120 similar samples on MalwareBazaar |
| TLSH | T15DE412305676F8E2FF9E47BF31B706A60CB22273C4924D4C56623AE8411BD198F5A4ED |
| Reporter | |
| Tags: | AveMariaRAT exe RAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
175
Origin country :
n/a
Vendor Threat Intelligence
Detection:
WarzoneRAT
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
AVE_MARIA
Verdict:
Malicious
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-07-20 15:13:06 UTC
AV detection:
10 of 28 (35.71%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
avemaria
Similar samples:
+ 1'110 additional samples on MalwareBazaar
Result
Malware family:
warzonerat
Score:
10/10
Tags:
family:warzonerat infostealer rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
byx.z86.ru:5200
Unpacked files
SH256 hash:
477cab8d4385172d679200edc6619462de2402d912f21f36981fc058987a6d52
MD5 hash:
16a9ddc4b32981114fe4f069a4353105
SHA1 hash:
bf73849f57c150f9e2199c61427f631be2dfa595
SH256 hash:
34917244bbd8100da730fd3c0108edb5c4a7d1eeb5b5494695d7dd38f56277a9
MD5 hash:
1843dfe2d5ad16ee8e4e15cef58d0a4c
SHA1 hash:
5401ff2834031d08c2e50f7bae422234ba340c07
Detections:
win_ave_maria_g0
win_ave_maria_auto
Parent samples :
c877097a2a3852b34c2ee4b0c7b2f5c7a3dc5313570e0680e04adea7e44201ef
394b84714c723fe917d65356700c36483a29610251eb06b93fb4a2b0922a68a4
99f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
27c7c159ac96bd76fc993fd76e2ee88106631af414a235a2a1aae1e31100af99
538b973f12e7eb9390b9b64cb36818b73b139bee73af7d5c7b8c5d72a0dc037a
04cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
dd5107d7cc5b86ef5a650ea6e01b662066c34072859272fa886379e304e7df43
20abe25c4f02f73cdda3e8e74187202fbdbf5fa2fd7fe92b2d1ab328b66c1950
691c75376ade3956492197d79853cab8eb38dca6dc2a7c2be3d4f28f445a3d2b
d966b0be571e5da5143ec930b1cf99c053412ecfdb76d46b16ba811c16e9eb8b
401bce69b94fd198482a5e4c760570afd0e6b85e64871894a4796acd5aeedd48
2d1e7b0b691c806b94f685f348dbe5bb4857edf0408f363314fe97535f4723a1
3eeb2e2ce79a4ef273dd4abf33b96be6131d0bc519bcd96b9fe5aafbd504bc59
c86c48057e9be95681c1a2d37f41232a2951988baa71fd415a03ba59725716b1
548f6a3cc2e79d94f8735680af5a91b4d8dc1a003e578d9027dca782939c9755
885e34ff7befbdcdb027a017843cbacdba7eebb34d3df2e3113cceb9adafe8b5
e51033b63bf3a77604f76f2b863b0dc1f4c86d936c807c0201ea4c24950b91a2
394b84714c723fe917d65356700c36483a29610251eb06b93fb4a2b0922a68a4
99f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
27c7c159ac96bd76fc993fd76e2ee88106631af414a235a2a1aae1e31100af99
538b973f12e7eb9390b9b64cb36818b73b139bee73af7d5c7b8c5d72a0dc037a
04cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
dd5107d7cc5b86ef5a650ea6e01b662066c34072859272fa886379e304e7df43
20abe25c4f02f73cdda3e8e74187202fbdbf5fa2fd7fe92b2d1ab328b66c1950
691c75376ade3956492197d79853cab8eb38dca6dc2a7c2be3d4f28f445a3d2b
d966b0be571e5da5143ec930b1cf99c053412ecfdb76d46b16ba811c16e9eb8b
401bce69b94fd198482a5e4c760570afd0e6b85e64871894a4796acd5aeedd48
2d1e7b0b691c806b94f685f348dbe5bb4857edf0408f363314fe97535f4723a1
3eeb2e2ce79a4ef273dd4abf33b96be6131d0bc519bcd96b9fe5aafbd504bc59
c86c48057e9be95681c1a2d37f41232a2951988baa71fd415a03ba59725716b1
548f6a3cc2e79d94f8735680af5a91b4d8dc1a003e578d9027dca782939c9755
885e34ff7befbdcdb027a017843cbacdba7eebb34d3df2e3113cceb9adafe8b5
e51033b63bf3a77604f76f2b863b0dc1f4c86d936c807c0201ea4c24950b91a2
SH256 hash:
f71d97c3d42af0eb4cc74e640a995eb0f288bab59b7be5cd89eccb21cd304f36
MD5 hash:
6c72218c48cd68cbcb654675053a0abb
SHA1 hash:
12207fa32070f99683648d87b44410e5d3cdf2de
SH256 hash:
68c284ad4073435819bdbbae46101a270a297ddeb9953fa831361ec4aa2a4656
MD5 hash:
f51a35998c348576ec64ba4f9058912d
SHA1 hash:
d7fa5f8443d13aaa2c411f6f5cd045972a9843ae
SH256 hash:
2532690fe927df0d64460b0323d66de54e7d9660c9962078af29d55ea8d0687f
MD5 hash:
72334a980df3d26a29ce6ee23b5b8415
SHA1 hash:
2deb7df59fecf3d2ef83212dd01ed49a663edfee
SH256 hash:
3eeb2e2ce79a4ef273dd4abf33b96be6131d0bc519bcd96b9fe5aafbd504bc59
MD5 hash:
b2b4962fc5b8df755b981b8eee177ff2
SHA1 hash:
9c0c8898c17c1288bc3edf0b44b2309c5dabd68c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.