MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4601b57fb9acf7117686773d8616efcac498591a6b650acc9a4f96871e9694b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 6 File information Comments

SHA256 hash: 4601b57fb9acf7117686773d8616efcac498591a6b650acc9a4f96871e9694b5
SHA3-384 hash: ead3e98c000f47342a7922ebf1fd154589a6464bb02821d522923d53918b30caacf18bc6630eb96340b1d238de29ef62
SHA1 hash: a11deb05354e51c737b263435dcab3fd2e26e90b
MD5 hash: 4373f1b989912d0121641f23a05b2f62
humanhash: low-avocado-sweet-july
File name:SecuriteInfo.com.CAP_HookExKeylogger.26449.31845
Download: download sample
Signature AveMariaRAT
File size:294'912 bytes
First seen:2020-07-16 22:46:35 UTC
Last seen:2020-08-02 07:34:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 6144:IflUeeeeeeeeeeeeeeeg4D4sHGkkcpj219R0sFYJ/sRBJ3AVk4zU:IflUeeeeeeeeeeeeeeeg4Nkcpj89R0sr
Threatray 464 similar samples on MalwareBazaar
TLSH 8454ADDC6D64A511CAAC1FB98CB2DA3056306E95F9F6F28827D0FE9F3172301E645623
Reporter SecuriteInfoCom
Tags:AveMariaRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Launching cmd.exe command interpreter
DNS request
Connection attempt
Enabling autorun with Startup directory
Unauthorized injection to a system process
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 246624 Sample: SecuriteInfo.com.CAP_HookEx... Startdate: 18/07/2020 Architecture: WINDOWS Score: 100 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for dropped file 2->35 37 Sigma detected: Scheduled temp file as task from temp location 2->37 39 5 other signatures 2->39 8 SecuriteInfo.com.CAP_HookExKeylogger.26449.exe 5 2->8         started        process3 file4 25 C:\Users\user\AppData\...\DWUNWlQtxJa.exe, PE32 8->25 dropped 27 C:\Users\user\AppData\Local\Temp\tmp4FC.tmp, XML 8->27 dropped 29 SecuriteInfo.com.C...ogger.26449.exe.log, ASCII 8->29 dropped 11 RegSvcs.exe 3 2 8->11         started        15 RegSvcs.exe 8->15         started        17 schtasks.exe 1 8->17         started        process5 dnsIp6 31 afada.duckdns.org 63.209.33.1, 52001 AS-CHOOPAUS United States 11->31 41 Writes to foreign memory regions 11->41 43 Allocates memory in foreign processes 11->43 45 Increases the number of concurrent connection per server for Internet Explorer 11->45 53 2 other signatures 11->53 19 cmd.exe 1 11->19         started        47 Contains functionality to inject threads in other processes 15->47 49 Contains functionality to steal Chrome passwords or cookies 15->49 51 Contains functionality to steal e-mail passwords 15->51 21 conhost.exe 17->21         started        signatures7 process8 process9 23 conhost.exe 19->23         started       
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-16 21:32:50 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Codoso_Gh0st_2
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:win_ave_maria_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AveMariaRAT

Executable exe 4601b57fb9acf7117686773d8616efcac498591a6b650acc9a4f96871e9694b5

(this sample)

  
Delivery method
Distributed via web download

Comments