MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 723ef98487bce9622b550cc458b59c54d26ac2b272d03e754d19597066888b72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 8 File information Comments

SHA256 hash: 723ef98487bce9622b550cc458b59c54d26ac2b272d03e754d19597066888b72
SHA3-384 hash: 212146a10509f6aabf39c4fa93aec83f643fa2a7498f5890585055b1bf4ed1747ff7234fa7b658f7124c22708562c0ad
SHA1 hash: c1e63171570b2931f36191d2386361db370ca914
MD5 hash: 553dd28e63c39cf9bf3eec6e402864fe
humanhash: maine-moon-carolina-jig
File name:723ef98487bce9622b550cc458b59c54d26ac2b272d03e754d19597066888b72
Download: download sample
Signature AveMariaRAT
File size:3'024'694 bytes
First seen:2020-11-14 18:04:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 676f4bc1db7fb9f072b157186a10179e (1'400 x AveMariaRAT, 37 x Riskware.Generic, 2 x njrat)
ssdeep 24576:ecp7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHD:ecp7AAmw4gxeOw46fUbNecCCFbNeci
Threatray 4'475 similar samples on MalwareBazaar
TLSH F8E5BED76A75018AD733A872604F9B60AA689C3D42D6732F2B777452B0835C7F291B0F
Reporter seifreed
Tags:AveMariaRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Forced system process termination
Creating a window
Creating a file in the %temp% directory
Creating a file
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Forced shutdown of a system process
Creating a file in the mass storage device
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Command shell drops VBS files
Contain functionality to detect virtual machines
Contains functionality to hide user accounts
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Sigma detected: System File Execution Location Anomaly
Spreads via windows shares (copies files to share folders)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Writes to foreign memory regions
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 317080 Sample: a6Zm9w5Ken Startdate: 15/11/2020 Architecture: WINDOWS Score: 100 140 Antivirus detection for dropped file 2->140 142 Antivirus / Scanner detection for submitted sample 2->142 144 Multi AV Scanner detection for submitted file 2->144 146 6 other signatures 2->146 13 a6Zm9w5Ken.exe 2->13         started        16 wscript.exe 1 2->16         started        18 StikyNot.exe 2->18         started        20 2 other processes 2->20 process3 signatures4 210 Tries to detect sandboxes / dynamic malware analysis system (file name check) 13->210 212 Contain functionality to detect virtual machines 13->212 214 Contains functionality to inject code into remote processes 13->214 216 Drops PE files with benign system names 13->216 22 a6Zm9w5Ken.exe 1 51 13->22         started        25 cmd.exe 2 13->25         started        218 Injects code into the Windows Explorer (explorer.exe) 16->218 27 explorer.exe 16->27         started        220 Injects a PE file into a foreign processes 18->220 29 StikyNot.exe 18->29         started        31 cmd.exe 18->31         started        process5 file6 168 Spreads via windows shares (copies files to share folders) 22->168 170 Writes to foreign memory regions 22->170 172 Allocates memory in foreign processes 22->172 174 Sample is not signed and drops a device driver 22->174 34 a6Zm9w5Ken.exe 1 3 22->34         started        38 diskperf.exe 5 22->38         started        176 Command shell drops VBS files 25->176 178 Drops VBS files to the startup folder 25->178 40 conhost.exe 25->40         started        180 Tries to detect sandboxes / dynamic malware analysis system (file name check) 27->180 182 Injects code into the Windows Explorer (explorer.exe) 27->182 184 Injects a PE file into a foreign processes 27->184 42 explorer.exe 46 27->42         started        44 cmd.exe 1 27->44         started        186 Sample uses process hollowing technique 29->186 120 C:\Users\user\AppData\Roaming\...\x.vbs, ASCII 31->120 dropped 46 conhost.exe 31->46         started        signatures7 process8 file9 102 C:\Windows\System\explorer.exe, PE32 34->102 dropped 148 Installs a global keyboard hook 34->148 48 explorer.exe 34->48         started        104 C:\Users\user\AppData\Local\...\StikyNot.exe, PE32 38->104 dropped 106 C:\Users\user\...\Disk.sys:Zone.Identifier, ASCII 38->106 dropped 108 C:\Users\...\SyncHost.exe:Zone.Identifier, ASCII 38->108 dropped 110 C:\Users\...\StikyNot.exe:Zone.Identifier, ASCII 38->110 dropped 51 StikyNot.exe 38->51         started        150 Injects code into the Windows Explorer (explorer.exe) 42->150 152 Drops executables to the windows directory (C:\Windows) and starts them 42->152 154 Spreads via windows shares (copies files to share folders) 42->154 156 Injects a PE file into a foreign processes 42->156 53 explorer.exe 42->53         started        55 diskperf.exe 42->55         started        57 conhost.exe 44->57         started        signatures10 process11 signatures12 128 Antivirus detection for dropped file 48->128 130 Machine Learning detection for dropped file 48->130 132 Tries to detect sandboxes / dynamic malware analysis system (file name check) 48->132 138 2 other signatures 48->138 59 explorer.exe 47 48->59         started        63 cmd.exe 1 48->63         started        134 Injects a PE file into a foreign processes 51->134 65 StikyNot.exe 46 51->65         started        67 cmd.exe 1 51->67         started        136 Installs a global keyboard hook 53->136 process13 file14 116 C:\Users\user\AppData\Local\Temp\Disk.sys, PE32 59->116 dropped 118 C:\Users\user\AppData\Local\...\SyncHost.exe, PE32 59->118 dropped 200 Injects code into the Windows Explorer (explorer.exe) 59->200 202 Spreads via windows shares (copies files to share folders) 59->202 204 Writes to foreign memory regions 59->204 69 explorer.exe 17 59->69         started        74 diskperf.exe 59->74         started        76 conhost.exe 63->76         started        206 Allocates memory in foreign processes 65->206 208 Injects a PE file into a foreign processes 65->208 78 StikyNot.exe 65->78         started        80 diskperf.exe 65->80         started        82 conhost.exe 67->82         started        signatures15 process16 dnsIp17 122 vccmd03.googlecode.com 69->122 124 vccmd02.googlecode.com 69->124 126 5 other IPs or domains 69->126 112 C:\Windows\System\spoolsv.exe, PE32 69->112 dropped 114 C:\Users\user\AppData\Roaming\mrsys.exe, PE32 69->114 dropped 188 System process connects to network (likely due to code injection or exploit) 69->188 190 Creates an undocumented autostart registry key 69->190 192 Installs a global keyboard hook 69->192 84 spoolsv.exe 69->84         started        87 spoolsv.exe 69->87         started        file18 signatures19 process20 signatures21 158 Antivirus detection for dropped file 84->158 160 Machine Learning detection for dropped file 84->160 162 Tries to detect sandboxes / dynamic malware analysis system (file name check) 84->162 89 spoolsv.exe 84->89         started        92 cmd.exe 84->92         started        164 Drops executables to the windows directory (C:\Windows) and starts them 87->164 166 Injects a PE file into a foreign processes 87->166 94 spoolsv.exe 87->94         started        96 cmd.exe 87->96         started        process22 signatures23 194 Spreads via windows shares (copies files to share folders) 89->194 196 Sample uses process hollowing technique 89->196 198 Injects a PE file into a foreign processes 89->198 98 conhost.exe 92->98         started        100 conhost.exe 96->100         started        process24
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2020-11-14 18:05:53 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  2/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat evasion infostealer persistence rat upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops startup file
Loads dropped DLL
Executes dropped EXE
Modifies Installed Components in the registry
UPX packed file
Warzone RAT Payload
Modifies WinLogon for persistence
Modifies visiblity of hidden/system files in Explorer
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
723ef98487bce9622b550cc458b59c54d26ac2b272d03e754d19597066888b72
MD5 hash:
553dd28e63c39cf9bf3eec6e402864fe
SHA1 hash:
c1e63171570b2931f36191d2386361db370ca914
Detections:
win_ave_maria_g0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ave_maria_warzone_rat
Author:jeFF0Falltrades
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:RDPWrap
Author:@bartblaze
Description:Identifies RDP Wrapper, sometimes used by attackers to maintain persistence.
Reference:https://github.com/stascorp/rdpwrap
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments