MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d2205a9b13efc7fc35da49a6944ba14a1d4eabea7384cd131159c30d8b6d931. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 5 Comments

SHA256 hash: 5d2205a9b13efc7fc35da49a6944ba14a1d4eabea7384cd131159c30d8b6d931
SHA3-384 hash: 960a09685496e22202415be557b7f4a62bf9e7608a0233c0948f659ae7cca590f884d23d65b0f7b8b44d6c1bcb7e7a1f
SHA1 hash: fb3c215d55bc65235e7a3e4cfa2f6cc6a2784c73
MD5 hash: acd512c05bcac07c522beade3ac09e46
humanhash: three-cat-cat-autumn
File name:5d2205a9b13efc7fc35da49a6944ba14a1d4eabea7384cd131159c30d8b6d931
Download: download sample
Signature AveMariaRAT
File size:260'480 bytes
First seen:2020-06-29 07:29:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 3072:VK7e6eq20s4hvkXSCJdQl//PrKt5KaUEeCJE1OAMTzA6QZki5l7AmMjkVlSm:VKS/0XhvOhJdMjuGfAEwjQSi5zLHT
TLSH 4844BF277298AF03CBAF15FF8081514443B1A55E7383F3CA5CD254E926D67D31AA2E8B
Reporter @JAMESWT_MHT
Tags:AveMariaRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
21
Origin country :
IT IT
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
WarzoneRAT
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2020-06-25 05:43:00 UTC
AV detection:
29 of 31 (93.55%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext

Yara Signatures


Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Codoso_Gh0st_2
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:win_ave_maria_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments