MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 49cecc5851dc6ed4f7dfd13f91ade2941ea491cd7c08df9f3630de8de50e3fb4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 12
| SHA256 hash: | 49cecc5851dc6ed4f7dfd13f91ade2941ea491cd7c08df9f3630de8de50e3fb4 |
|---|---|
| SHA3-384 hash: | b5df1460f65c86161fcad3a1a1c000b8f66288391141be46142eb6eddf98381d75f78f49e707d7d024d3925a56abb2cd |
| SHA1 hash: | 5ddf66aec8de460d4dcd85845bd84ea5007d62ac |
| MD5 hash: | 315ee22d17ea8ce5cbc0b443f1b5789c |
| humanhash: | ceiling-mirror-spring-double |
| File name: | Sandra-Wohl-Bewerbung-Anschreiben.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 101'888 bytes |
| First seen: | 2022-10-19 02:39:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner) |
| ssdeep | 1536:/7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf3w/OpJ0HWIYuOl:z7DhdC6kzWypvaQ0FxyNTBf3wOpF |
| Threatray | 2'974 similar samples on MalwareBazaar |
| TLSH | T1F9A38E41F3E102F7E6F2053100A6766F9736A2389724A8DBC74C3D929913AD5A63D3E9 |
| TrID | 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 12.7% (.EXE) Win64 Executable (generic) (10523/12/4) 7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 6cecccdcd4d0e8f0 (4 x AveMariaRAT, 1 x Smoke Loader, 1 x GuLoader) |
| Reporter | |
| Tags: | AveMariaRAT exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sandra-Wohl-Bewerbung-Anschreiben.exe
Verdict:
Malicious activity
Analysis date:
2022-10-19 06:36:28 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Forced system process termination
Launching a process
Sending an HTTP GET request
Creating a file
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Modifying a system executable file
Launching cmd.exe command interpreter
Launching a tool to kill processes
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
No Threat
Threat level:
2/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.adwa.expl
Score:
96 / 100
Signature
Antivirus detection for dropped file
Drops PE files to the startup folder
Drops script or batch files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Yara detected Babadeda
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Generic
Status:
Suspicious
First seen:
2022-10-19 02:57:57 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
8 of 26 (30.77%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 2'964 additional samples on MalwareBazaar
Result
Malware family:
warzonerat
Score:
10/10
Tags:
family:eternity family:warzonerat evasion infostealer persistence ransomware rat trojan upx
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies Control Panel
Modifies registry class
NTFS ADS
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Sets desktop wallpaper using registry
Adds Run key to start application
Checks computer location settings
Drops startup file
Loads dropped DLL
Blocklisted process makes network request
Disables Task Manager via registry modification
Downloads MZ/PE file
Executes dropped EXE
Modifies extensions of user files
UPX packed file
Warzone RAT payload
Eternity
Modifies Windows Defender Real-time Protection settings
Modifies security service
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
111.90.151.174:5200
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7a4f15923f0e94588f7eaad463100a729908ee2fd094aba80c57cef5c8beb779
MD5 hash:
af06247b74dd39a3f9c65e1c602b160e
SHA1 hash:
34d7a587bf2a66bb706ad1167e4aaab1dabec9fe
SH256 hash:
765b32fd54af78542b1254d2048024dada9426a409bad725b7ff1dcf3028db5f
MD5 hash:
5da69c87d0d97ddf2ec6ce7af1f8c631
SHA1 hash:
e728bcf0c6f1b67ad63f0eaf3dacc9a4f66ee38f
SH256 hash:
a7ea0d8fdc9c348f88bd7aeaf52d6605a7de0037fbdcb35879c9a5b0b430a0c1
MD5 hash:
c5bb5ced47676f3c336d396befdabc35
SHA1 hash:
7d5d94c05ebae7b0811541faa294db28d2695d4e
SH256 hash:
6436aa479113d922b03c709a3bf35d9fc420f112a4921771d59c017b8a63af95
MD5 hash:
7798504c0d3c92a075b15126317324d3
SHA1 hash:
4e7bda323e7817dfc18c71d817303bc40f0b014f
SH256 hash:
7bc69245b1499d875afac012c159eadd33400b915fadedbfa1bf5041ead199b7
MD5 hash:
d14617724be24d63f5af72a436835300
SHA1 hash:
fc5bc31d528ca85f211501ed06dc3d4843f61c4b
SH256 hash:
73bedd5fe8269ef6d35c62e06dcccc7e1c905a963141d97d6703b1487ce8232e
MD5 hash:
dfa8c6f048bc90280e023359bc5095b5
SHA1 hash:
6fd751be12cc89736129c4a1048199bc6e59b150
SH256 hash:
7db6c1b21ac2d1bbe8771baa36e5b8137ee84e86c9115a2f5c9a799eded32858
MD5 hash:
c5045f5f77cf5f7a844c35a35604bdd9
SHA1 hash:
5e668f9af090e01579e2a5c081343cc08184112c
SH256 hash:
271dfc41a00ae7bc6b36ce97fa63046cd65ba5b11f73fe10f5b87f757dbc6f42
MD5 hash:
a03d7084831ab5495c6f1032bc984f05
SHA1 hash:
40a639dd067cf1e679d674935daa5a7a849cb209
SH256 hash:
34eade925a6089b55659868d6718c54c65b36d488f89e66fdad562b4ece30759
MD5 hash:
8edc49bbe9f228a6145b708006286d68
SHA1 hash:
35dc3a4f8886a359e46d6986bcabefe3080a69ef
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
49cecc5851dc6ed4f7dfd13f91ade2941ea491cd7c08df9f3630de8de50e3fb4
MD5 hash:
315ee22d17ea8ce5cbc0b443f1b5789c
SHA1 hash:
5ddf66aec8de460d4dcd85845bd84ea5007d62ac
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.