MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b251cd96731540018f009f2bba5781785dccb7cd707a2b2da745c8fffead22d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 4b251cd96731540018f009f2bba5781785dccb7cd707a2b2da745c8fffead22d
SHA3-384 hash: ffbc36d8faab6673518789908def93f53bb5ded559d25c4f6b034a0055910c61d91997914d3b9d99ba7cab61886d54df
SHA1 hash: d4231cf0fa234234db07dc0481ff2d86d062be7d
MD5 hash: d4eeb984eb487a78d9d463f677dc1d22
humanhash: oven-illinois-cup-nebraska
File name:Shipping Document.scr.exe
Download: download sample
Signature AveMariaRAT
File size:3'000'320 bytes
First seen:2023-10-26 17:10:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:AgZjcz5YC/Nmxhorodv8eHBK5WvXJ9o90/0bZ8EV3BP/:xo9k8eHBK5WfJCm0bZ8EV35
Threatray 59 similar samples on MalwareBazaar
TLSH T17AD5E513BB46C9A3C5485337C597C63403A0DFA2631BE61B2BEB2B6774433A6D946327
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon f8f8f0f0e4c4c4d0 (13 x AveMariaRAT, 2 x AsyncRAT, 1 x NanoCore)
Reporter abuse_ch
Tags:AveMariaRAT exe RAT


Avatar
abuse_ch
AveMariaRAT C2:
185.254.37.81:5200

Intelligence


File Origin
# of uploads :
1
# of downloads :
375
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Shipping Document.scr.bin.zip
Verdict:
Malicious activity
Analysis date:
2023-10-26 23:24:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Setting a keyboard event handler
DNS request
Network activity
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control lolbin masquerade
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AveMaria, PrivateLoader, UACMe
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to check if Internet connection is working
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to modify clipboard data
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected AveMaria stealer
Yara detected Costura Assembly Loader
Yara detected PrivateLoader
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat collection infostealer rat spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads user/profile data of web browsers
Warzone RAT payload
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
185.254.37.81:5200
Unpacked files
SH256 hash:
4b251cd96731540018f009f2bba5781785dccb7cd707a2b2da745c8fffead22d
MD5 hash:
d4eeb984eb487a78d9d463f677dc1d22
SHA1 hash:
d4231cf0fa234234db07dc0481ff2d86d062be7d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments