MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4a7fd200df098a126c9661ba9507674202dbd1864fb3edf03860110f66e8297a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 4
| SHA256 hash: | 4a7fd200df098a126c9661ba9507674202dbd1864fb3edf03860110f66e8297a |
|---|---|
| SHA3-384 hash: | 5f12d8085fa2ca1e9bfd7a18c94fc97e91e2540dd30f852e7cc7f43daf4612a5114b43d6a41c641c6757c02efcb53d1a |
| SHA1 hash: | 27942c1091567c64078cac3e170a27752c831b4f |
| MD5 hash: | 5293bc2f297363e08558299e91136ee5 |
| humanhash: | oven-music-kansas-nine |
| File name: | 1e9e01612f8a9eb1b7d0c2f7e16be8ab.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 103'936 bytes |
| First seen: | 2020-03-30 01:40:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 879635b629affd65258851469f9bf6f9 (31 x AveMariaRAT) |
| ssdeep | 1536:lvqIPE8ddFD1frrq7gVxoNGPNJKF1m+xVE0/bK:cI8CxFVxAMNJKu+xVE0TK |
| Threatray | 423 similar samples on MalwareBazaar |
| TLSH | D5A39D2373D14439F67102B02CB97F79CABFFE380221855BD72456876B71994EA263A3 |
| Reporter | |
| Tags: | AveMariaRAT exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=1UD-IOEF5ULeY9fkl5xhHtxtQfDR6SbIJ
Intelligence
File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Antiav
Status:
Malicious
First seen:
2020-03-30 02:35:27 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
37 of 46 (80.43%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
avemaria
Similar samples:
+ 413 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropped by
MD5 0dc4b235ce079ce4cd31a9779508ea6e
Dropped by
GuLoader
Dropped by
SHA256 0b48099f10a4e5a1a241ea2c8e4346aa8171c7635d889360ab9eccfb2336a8b7
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::FreeSid ADVAPI32.dll::InitializeSecurityDescriptor |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CoInitializeSecurity |
| DP_API | Uses DP API | CRYPT32.dll::CryptUnprotectData |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::SetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW SHELL32.dll::ShellExecuteExA SHELL32.dll::ShellExecuteExW |
| URL_MONIKERS_API | Can Download & Execute components | urlmon.dll::URLDownloadToFileW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateRemoteThread KERNEL32.dll::CreateProcessW KERNEL32.dll::CreateProcessA KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken KERNEL32.dll::VirtualAllocEx |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WinExec |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW SHELL32.dll::SHCreateDirectoryExW KERNEL32.dll::CreateFileW KERNEL32.dll::CreateFileA KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::LookupAccountSidW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExA ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyA ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExA ADVAPI32.dll::RegOpenKeyExW |
| WIN_SOCK_API | Uses Network to send and receive data | WS2_32.dll::freeaddrinfo WS2_32.dll::getaddrinfo WS2_32.dll::InetNtopW |
| WIN_SVC_API | Can Manipulate Windows Services | ADVAPI32.dll::ChangeServiceConfigW ADVAPI32.dll::OpenSCManagerW ADVAPI32.dll::OpenServiceW ADVAPI32.dll::QueryServiceConfigW ADVAPI32.dll::StartServiceW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.COVID-19 malspam campaign distributing GuLoader->AveMariaRAT:
HELO: server.yafuzsport.com
Sending IP: 148.251.119.5
From: WHO: World Health Organization <who_advise@who.int>
Subject: Alerting Consumers
Subject: Latest corona-virus updates
Attachment: Health-E-book·pdf.zip (contains "Health-E-book·pdf.exe")
GuLoader payload URL (AveMariaRAT):
https://drive.google.com/uc?export=download&id=1UD-IOEF5ULeY9fkl5xhHtxtQfDR6SbIJ