MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 7
| SHA256 hash: | 5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754 |
|---|---|
| SHA3-384 hash: | 79a93da361bb6ad5e047e1a6c9e7cc8a06fe0f3e71bdac3dc38aedb9b8e894715e973d3b119e2b6fcad21e7414418a66 |
| SHA1 hash: | 32c8a7334444bf8844b0091255bbefee83ddad6b |
| MD5 hash: | d6bc9cb3362a09dff11449527080e03f |
| humanhash: | louisiana-seventeen-uncle-juliet |
| File name: | Bank Remittance copy.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 565'248 bytes |
| First seen: | 2021-09-01 06:06:42 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ef471c0edf1877cd5a881a6a8bf647b9 (83 x Formbook, 33 x Loki, 31 x Loda) |
| ssdeep | 12288:+Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1nNzfJoomJxRHHE6mRsc9gC8NLhPtDWl3:ThloDX0XOf4RNzfJhOa5 |
| Threatray | 2'337 similar samples on MalwareBazaar |
| TLSH | T1D5C4E163A187DCA6D649593D42A4FBAC423CCF524D1FA68570793223EA73D0B2F48CD6 |
| dhash icon | f0f0f2b2e834b498 (29 x AgentTesla, 12 x AveMariaRAT, 8 x RedLineStealer) |
| Reporter | |
| Tags: | AveMariaRAT exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Unauthorized injection to a recently created process
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Verdict:
Malicious
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
AutoIt script contains suspicious strings
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Found malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2021-08-31 11:49:28 UTC
AV detection:
12 of 42 (28.57%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
avemaria
Similar samples:
+ 2'327 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
upx
Behaviour
Modifies system certificate store
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
b46aae9e724b7c5f6e5cbe80a05d26d25014fb747a7cb186e94337d109663248
MD5 hash:
b0479977843026c1aaa413b4fc5aca86
SHA1 hash:
f5bbea7f0ae4d45e17b58be608d156b3e5c6844e
SH256 hash:
5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754
MD5 hash:
d6bc9cb3362a09dff11449527080e03f
SHA1 hash:
32c8a7334444bf8844b0091255bbefee83ddad6b
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.85
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.