MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 548f6a3cc2e79d94f8735680af5a91b4d8dc1a003e578d9027dca782939c9755. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: 548f6a3cc2e79d94f8735680af5a91b4d8dc1a003e578d9027dca782939c9755
SHA3-384 hash: 46a97671049f4ec90d8fa622e7280dae0df38c2a36d5c99f502fc798c0a98a582be8c2979b2aa95d4276c59d99b5d477
SHA1 hash: f178dbcaafb30841c1a6a1c78be84ecbaf37b3f7
MD5 hash: f8b12b37061c62984a170f834535842b
humanhash: october-mississippi-jig-beer
File name:f8b12b37061c62984a170f834535842b.exe
Download: download sample
Signature AveMariaRAT
File size:528'384 bytes
First seen:2021-07-22 07:58:41 UTC
Last seen:2021-07-22 08:47:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:PT0I5eEx25ExY97iMflqW4SeLA/mIXK48W:DT294MfUFpA/nK43
Threatray 1'880 similar samples on MalwareBazaar
TLSH T10FB422313D27E5E6D7FA4B32D2A61E14AFB17BDB8523E90C94DC225D075B381CB05A28
dhash icon 489669d8d8699648 (53 x AgentTesla, 24 x SnakeKeylogger, 16 x AveMariaRAT)
Reporter abuse_ch
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f8b12b37061c62984a170f834535842b.exe
Verdict:
Malicious activity
Analysis date:
2021-07-22 08:36:35 UTC
Tags:
trojan stealer rat avemaria remcos loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos AveMaria
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected Remcos RAT
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AveMaria stealer
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 452426 Sample: 8NWXF8RRjU.exe Startdate: 22/07/2021 Architecture: WINDOWS Score: 100 115 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->115 117 Multi AV Scanner detection for domain / URL 2->117 119 Malicious sample detected (through community Yara rule) 2->119 121 16 other signatures 2->121 11 8NWXF8RRjU.exe 5 2->11         started        15 explorer.exe 2->15         started        17 explorer.exe 2->17         started        19 explorer.exe 2->19         started        process3 file4 77 C:\Users\user\AppData\...\8NWXF8RRjU.exe, PE32 11->77 dropped 79 C:\Users\...\8NWXF8RRjU.exe:Zone.Identifier, ASCII 11->79 dropped 81 C:\Users\user\AppData\...\8NWXF8RRjU.exe.log, ASCII 11->81 dropped 153 Writes to foreign memory regions 11->153 155 Injects a PE file into a foreign processes 11->155 21 8NWXF8RRjU.exe 4 5 11->21         started        25 8NWXF8RRjU.exe 11->25         started        27 8NWXF8RRjU.exe 11->27         started        29 8NWXF8RRjU.exe 11->29         started        signatures5 process6 file7 69 C:\ProgramData\svchost.exe, PE32 21->69 dropped 71 C:\ProgramData\svchost.exe:Zone.Identifier, ASCII 21->71 dropped 123 Increases the number of concurrent connection per server for Internet Explorer 21->123 125 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->125 31 svchost.exe 4 21->31         started        35 cmd.exe 1 21->35         started        127 Multi AV Scanner detection for dropped file 25->127 129 Machine Learning detection for dropped file 25->129 131 Contains functionality to inject threads in other processes 25->131 133 3 other signatures 25->133 signatures8 process9 file10 83 C:\Users\user\AppData\Local\...\svchost.exe, PE32 31->83 dropped 95 Multi AV Scanner detection for dropped file 31->95 97 Machine Learning detection for dropped file 31->97 99 Writes to foreign memory regions 31->99 105 2 other signatures 31->105 37 svchost.exe 22 31->37         started        42 svchost.exe 31->42         started        101 Uses ping.exe to sleep 35->101 103 Uses ping.exe to check the status of other devices and networks 35->103 44 reg.exe 1 1 35->44         started        46 conhost.exe 35->46         started        signatures11 process12 dnsIp13 85 byx.z86.ru 37.0.11.43, 2404, 49717, 49718 WKD-ASIE Netherlands 37->85 87 192.168.2.1 unknown unknown 37->87 89 hgoz.12v.si 37->89 73 C:\Users\user\AppData\Roaming\qFgy.berI.exe, PE32 37->73 dropped 75 C:\Users\user\AppData\Local\...\rem[1].exe, PE32 37->75 dropped 137 Tries to harvest and steal browser information (history, passwords, etc) 37->137 139 Writes to foreign memory regions 37->139 141 Allocates memory in foreign processes 37->141 151 2 other signatures 37->151 48 qFgy.berI.exe 2 4 37->48         started        52 cmd.exe 1 37->52         started        143 System process connects to network (likely due to code injection or exploit) 42->143 145 Multi AV Scanner detection for dropped file 42->145 147 Machine Learning detection for dropped file 42->147 149 Creates an undocumented autostart registry key 44->149 file14 signatures15 process16 file17 67 C:\Users\user\AppData\...\explorer.exe, PE32 48->67 dropped 107 Antivirus detection for dropped file 48->107 109 Multi AV Scanner detection for dropped file 48->109 111 Machine Learning detection for dropped file 48->111 113 Drops PE files with benign system names 48->113 54 cmd.exe 1 48->54         started        57 conhost.exe 52->57         started        signatures18 process19 signatures20 135 Uses ping.exe to sleep 54->135 59 explorer.exe 2 54->59         started        63 PING.EXE 1 54->63         started        65 conhost.exe 54->65         started        process21 dnsIp22 91 dpqw-avira.bot.nu 59->91 157 Antivirus detection for dropped file 59->157 159 System process connects to network (likely due to code injection or exploit) 59->159 161 Multi AV Scanner detection for dropped file 59->161 163 Machine Learning detection for dropped file 59->163 93 127.0.0.1 unknown unknown 63->93 signatures23
Threat name:
Win32.Trojan.CrypterX
Status:
Malicious
First seen:
2021-07-21 22:56:08 UTC
AV detection:
9 of 28 (32.14%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:remcos family:warzonerat botnet:host infostealer persistence rat spyware stealer
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Remcos
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
byx.z86.ru:5200
dpqw-avira.bot.nu:2404
Unpacked files
SH256 hash:
477cab8d4385172d679200edc6619462de2402d912f21f36981fc058987a6d52
MD5 hash:
16a9ddc4b32981114fe4f069a4353105
SHA1 hash:
bf73849f57c150f9e2199c61427f631be2dfa595
SH256 hash:
06a54cb86feba424ebd34c437e914379849add9236d39f79e18b44ddfca6ebde
MD5 hash:
7d04a295aa4cda810ff45da83333ce94
SHA1 hash:
13e89b224c426dcc69fb9229aeada83dc991f7bb
SH256 hash:
f71d97c3d42af0eb4cc74e640a995eb0f288bab59b7be5cd89eccb21cd304f36
MD5 hash:
6c72218c48cd68cbcb654675053a0abb
SHA1 hash:
12207fa32070f99683648d87b44410e5d3cdf2de
SH256 hash:
e63c7632e7ca0aec82b76a22c98a08b33bb25ca9d4d93db72edddb51bb162ff5
MD5 hash:
c025a8045cdf6645ef4a2cfba9d54f1d
SHA1 hash:
07165cef73c833094129602c0bd061c0397548b3
SH256 hash:
548f6a3cc2e79d94f8735680af5a91b4d8dc1a003e578d9027dca782939c9755
MD5 hash:
f8b12b37061c62984a170f834535842b
SHA1 hash:
f178dbcaafb30841c1a6a1c78be84ecbaf37b3f7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:buerloader_halo_generated
Author:Halogen Generated Rule, Corsin Camichel
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AveMariaRAT

Executable exe 548f6a3cc2e79d94f8735680af5a91b4d8dc1a003e578d9027dca782939c9755

(this sample)

Comments