MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 58f6462c0225f4ec37209add8486ef9bdcdc1d1e766096af73b3c7797ebeadb1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 12
| SHA256 hash: | 58f6462c0225f4ec37209add8486ef9bdcdc1d1e766096af73b3c7797ebeadb1 |
|---|---|
| SHA3-384 hash: | 20446105e8e829ed44953a879e09a1b514cb66fbb7290bf1b4104a0f5020de98ab2e096d5ee3d66f8c3545d9f32fac8b |
| SHA1 hash: | 00906dca6d4134495a95283cc2c5ac458f2891fd |
| MD5 hash: | 2411437b7a8c5e897e974b5a33e67428 |
| humanhash: | xray-chicken-connecticut-ohio |
| File name: | Sandra-Wohl-Bewerbung-Arbeitszeugnis.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 101'888 bytes |
| First seen: | 2022-10-19 02:39:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner) |
| ssdeep | 1536:/7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfPwNOpJ0HWIhOl:z7DhdC6kzWypvaQ0FxyNTBfP6OpH |
| Threatray | 2'974 similar samples on MalwareBazaar |
| TLSH | T1D4A38E41F3E102F7EAF2053100A6762F973663289764A8DBC74C3D929913AD5A73D3E9 |
| TrID | 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 12.7% (.EXE) Win64 Executable (generic) (10523/12/4) 7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 6cecccdcd4d0e8f0 (4 x AveMariaRAT, 1 x Smoke Loader, 1 x GuLoader) |
| Reporter | |
| Tags: | AveMariaRAT exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
260
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sandra-Wohl-Bewerbung-Arbeitszeugnis.exe
Verdict:
Suspicious activity
Analysis date:
2022-10-19 06:32:13 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Launching a process
Sending an HTTP GET request
Creating a file
Using the Windows Management Instrumentation requests
Modifying a system executable file
Launching cmd.exe command interpreter
Creating a file in the %temp% subdirectories
Running batch commands
Forced system process termination
Launching a tool to kill processes
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
No Threat
Threat level:
2/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.adwa.expl
Score:
96 / 100
Signature
Antivirus detection for dropped file
Drops PE files to the startup folder
Drops script or batch files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Yara detected Babadeda
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Generic
Status:
Suspicious
First seen:
2022-10-19 02:57:57 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
8 of 26 (30.77%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 2'964 additional samples on MalwareBazaar
Result
Malware family:
warzonerat
Score:
10/10
Tags:
family:eternity family:warzonerat evasion infostealer persistence ransomware rat trojan upx
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies Control Panel
Modifies registry class
NTFS ADS
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Sets desktop wallpaper using registry
Adds Run key to start application
Checks computer location settings
Drops startup file
Loads dropped DLL
Disables Task Manager via registry modification
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Warzone RAT payload
Eternity
Modifies Windows Defender Real-time Protection settings
Modifies security service
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
111.90.151.174:5200
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
e74b7a431a0a463a507f833f361bd4cc9845865e33474895d1bd8db6397098d4
MD5 hash:
129ce672adb65fbdea163346a11d7495
SHA1 hash:
40c7c6ca563e7b02364dd64271bf5aff259364a2
SH256 hash:
b1399826981a8d0af52f569e209f4b385faf808227347e2d42e1198fa6a46ce4
MD5 hash:
b239751152267f82335cc8d352e8aab0
SHA1 hash:
24efa8026dc2f3a08462ed4b2861298f655f3b17
SH256 hash:
940d427148221b6c4f51652675f7f6fbb828ea1d559d74f39e96c19c7ed073b1
MD5 hash:
89dfa27b120c5903d01618a8bfdb2f2f
SHA1 hash:
dead46c8a61d60437ba17cca19d455385e13c782
SH256 hash:
f6ed1e736a5fa95742e40b3645e244c90d90fba5c7beb831f087e7cc76ee2e34
MD5 hash:
b6828b6134d5b72e11beac6cf061f5c5
SHA1 hash:
7ecfdb9575a204620d04ba48ee0f0788afead5a8
SH256 hash:
4f41ad3e4917bcf4a93a4dbbffa3d8035d529ab086475a72c0642c12f4a3103a
MD5 hash:
66093b1a06de1a36e52456de420a52f4
SHA1 hash:
5d9b40039d91e89338469ef25c6a759b769ec8f8
SH256 hash:
fe61162d0e71ae1e6f4a83d5521d454c58d89bdcace2111a243a5a9667c1a8d0
MD5 hash:
3b87fbb1621be51a19d224eb94654340
SHA1 hash:
338504abcad7dfbc84e29273cb1db26a5a37d310
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
58f6462c0225f4ec37209add8486ef9bdcdc1d1e766096af73b3c7797ebeadb1
MD5 hash:
2411437b7a8c5e897e974b5a33e67428
SHA1 hash:
00906dca6d4134495a95283cc2c5ac458f2891fd
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.