MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754
SHA3-384 hash: 79a93da361bb6ad5e047e1a6c9e7cc8a06fe0f3e71bdac3dc38aedb9b8e894715e973d3b119e2b6fcad21e7414418a66
SHA1 hash: 32c8a7334444bf8844b0091255bbefee83ddad6b
MD5 hash: d6bc9cb3362a09dff11449527080e03f
humanhash: louisiana-seventeen-uncle-juliet
File name:Bank Remittance copy.exe
Download: download sample
Signature AveMariaRAT
File size:565'248 bytes
First seen:2021-09-01 06:06:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ef471c0edf1877cd5a881a6a8bf647b9 (83 x Formbook, 33 x Loki, 31 x Loda)
ssdeep 12288:+Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1nNzfJoomJxRHHE6mRsc9gC8NLhPtDWl3:ThloDX0XOf4RNzfJhOa5
Threatray 2'337 similar samples on MalwareBazaar
TLSH T1D5C4E163A187DCA6D649593D42A4FBAC423CCF524D1FA68570793223EA73D0B2F48CD6
dhash icon f0f0f2b2e834b498 (29 x AgentTesla, 12 x AveMariaRAT, 8 x RedLineStealer)
Reporter lowmal3
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Unauthorized injection to a recently created process
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
AutoIt script contains suspicious strings
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Found malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2021-08-31 11:49:28 UTC
AV detection:
12 of 42 (28.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Modifies system certificate store
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
b46aae9e724b7c5f6e5cbe80a05d26d25014fb747a7cb186e94337d109663248
MD5 hash:
b0479977843026c1aaa413b4fc5aca86
SHA1 hash:
f5bbea7f0ae4d45e17b58be608d156b3e5c6844e
SH256 hash:
5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754
MD5 hash:
d6bc9cb3362a09dff11449527080e03f
SHA1 hash:
32c8a7334444bf8844b0091255bbefee83ddad6b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AveMariaRAT

Executable exe 5b91df85affd5ae567a565e3dca83bc8a014acddcf7bd743782b7b6cb2f93754

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments