MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 83a4e0b8a56cfd55741c12a85af836036eb780e5005ec056eede4fc05166a799. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 7 File information Comments

SHA256 hash: 83a4e0b8a56cfd55741c12a85af836036eb780e5005ec056eede4fc05166a799
SHA3-384 hash: dfaa2be73283104407e64361e006c96f06dd84fb8e4cd070b8a22fed0fbcb9995f737b3828ab5c3206e54d1603fa31a1
SHA1 hash: f425ac094326294b3c4a00aa290cc01f2c16a756
MD5 hash: 1d30d6380f97e2a1deb2d3d551f72eed
humanhash: california-finch-lactose-queen
File name:83a4e0b8a56cfd55741c12a85af836036eb780e5005ec056eede4fc05166a799
Download: download sample
Signature AveMariaRAT
File size:1'931'175 bytes
First seen:2020-11-10 11:14:55 UTC
Last seen:2024-07-24 18:16:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7be4c98eebb39d282cdffc1cea8fb470 (661 x AveMariaRAT, 29 x Riskware.Generic)
ssdeep 12288:h2Jaisuu1nJw2u6TPCkZpU6Vvz5aXacE8ok3eWmMF/NA7W2FeDSIGVH/KIDgDgU7:hHfDPhn3Vz5a5ObQDbGV6eH81km
Threatray 40 similar samples on MalwareBazaar
TLSH BA957C517B794473D2432A74BC0FA36060247E6F3E80A35B7FB93D45AAB3B53601636A
Reporter seifreed
Tags:AveMariaRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
53
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file in the %temp% directory
Creating a file
Launching a process
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to hide user accounts
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Searches for specific processes (likely to inject)
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Spreads via windows shares (copies files to share folders)
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 314070 Sample: VPsz3YYyHZ Startdate: 11/11/2020 Architecture: WINDOWS Score: 100 130 Antivirus detection for dropped file 2->130 132 Antivirus / Scanner detection for submitted sample 2->132 134 Multi AV Scanner detection for submitted file 2->134 136 6 other signatures 2->136 12 VPsz3YYyHZ.exe 1 51 2->12         started        16 StikyNot.exe 46 2->16         started        18 StikyNot.exe 2->18         started        20 7 other processes 2->20 process3 dnsIp4 96 C:\Users\user\...\Disk.sys:Zone.Identifier, ASCII 12->96 dropped 98 C:\Users\...\StikyNot.exe:Zone.Identifier, ASCII 12->98 dropped 166 Detected unpacking (changes PE section rights) 12->166 168 Detected unpacking (overwrites its own PE header) 12->168 170 Spreads via windows shares (copies files to share folders) 12->170 184 2 other signatures 12->184 23 VPsz3YYyHZ.exe 1 3 12->23         started        28 diskperf.exe 12->28         started        172 Antivirus detection for dropped file 16->172 174 Detected unpacking (creates a PE file in dynamic memory) 16->174 176 Machine Learning detection for dropped file 16->176 186 2 other signatures 16->186 30 StikyNot.exe 16->30         started        32 diskperf.exe 16->32         started        178 Sample uses process hollowing technique 18->178 180 Injects a PE file into a foreign processes 18->180 102 127.0.0.1 unknown unknown 20->102 182 Changes security center settings (notifications, updates, antivirus, firewall) 20->182 file5 signatures6 process7 dnsIp8 104 192.168.2.1 unknown unknown 23->104 88 C:\Windows\System\explorer.exe, PE32 23->88 dropped 152 Installs a global keyboard hook 23->152 34 explorer.exe 47 23->34         started        154 Drops executables to the windows directory (C:\Windows) and starts them 30->154 38 explorer.exe 30->38         started        file9 signatures10 process11 file12 84 C:\Users\user\AppData\Local\Temp\Disk.sys, PE32 34->84 dropped 86 C:\Users\user\AppData\Local\...\StikyNot.exe, PE32 34->86 dropped 138 Antivirus detection for dropped file 34->138 140 Machine Learning detection for dropped file 34->140 142 Injects code into the Windows Explorer (explorer.exe) 34->142 150 4 other signatures 34->150 40 explorer.exe 3 17 34->40         started        45 diskperf.exe 34->45         started        144 Spreads via windows shares (copies files to share folders) 38->144 146 Sample uses process hollowing technique 38->146 148 Injects a PE file into a foreign processes 38->148 signatures13 process14 dnsIp15 106 vccmd03.googlecode.com 40->106 108 vccmd02.googlecode.com 40->108 110 4 other IPs or domains 40->110 90 C:\Windows\System\spoolsv.exe, PE32 40->90 dropped 92 C:\Users\user\AppData\Roaming\mrsys.exe, PE32 40->92 dropped 156 System process connects to network (likely due to code injection or exploit) 40->156 158 Creates an undocumented autostart registry key 40->158 160 Installs a global keyboard hook 40->160 47 spoolsv.exe 47 40->47         started        51 spoolsv.exe 46 40->51         started        53 spoolsv.exe 46 40->53         started        55 3 other processes 40->55 file16 signatures17 process18 file19 100 C:\Users\user\AppData\Local\...\SyncHost.exe, PE32 47->100 dropped 112 Antivirus detection for dropped file 47->112 114 Detected unpacking (changes PE section rights) 47->114 116 Detected unpacking (creates a PE file in dynamic memory) 47->116 128 3 other signatures 47->128 57 spoolsv.exe 47->57         started        61 diskperf.exe 47->61         started        118 Spreads via windows shares (copies files to share folders) 51->118 120 Injects a PE file into a foreign processes 51->120 63 spoolsv.exe 51->63         started        65 diskperf.exe 51->65         started        122 Writes to foreign memory regions 53->122 124 Allocates memory in foreign processes 53->124 67 spoolsv.exe 53->67         started        69 diskperf.exe 53->69         started        126 Drops executables to the windows directory (C:\Windows) and starts them 55->126 71 spoolsv.exe 55->71         started        73 spoolsv.exe 55->73         started        75 3 other processes 55->75 signatures20 process21 file22 94 C:\Windows\System\svchost.exe, PE32 57->94 dropped 162 Installs a global keyboard hook 57->162 77 svchost.exe 57->77         started        164 Drops executables to the windows directory (C:\Windows) and starts them 63->164 80 svchost.exe 63->80         started        signatures23 process24 signatures25 188 Antivirus detection for dropped file 77->188 190 Detected unpacking (changes PE section rights) 77->190 192 Detected unpacking (overwrites its own PE header) 77->192 194 Machine Learning detection for dropped file 77->194 82 svchost.exe 77->82         started        196 Spreads via windows shares (copies files to share folders) 80->196 198 Sample uses process hollowing technique 80->198 200 Injects a PE file into a foreign processes 80->200 process26
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2020-11-10 11:18:37 UTC
AV detection:
37 of 48 (77.08%)
Threat level:
  2/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat evasion infostealer persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Modifies Installed Components in the registry
Warzone RAT Payload
Modifies WinLogon for persistence
Modifies visiblity of hidden/system files in Explorer
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
83a4e0b8a56cfd55741c12a85af836036eb780e5005ec056eede4fc05166a799
MD5 hash:
1d30d6380f97e2a1deb2d3d551f72eed
SHA1 hash:
f425ac094326294b3c4a00aa290cc01f2c16a756
Detections:
win_ave_maria_g0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ave_maria_warzone_rat
Author:jeFF0Falltrades
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:RDPWrap
Author:@bartblaze
Description:Identifies RDP Wrapper, sometimes used by attackers to maintain persistence.
Reference:https://github.com/stascorp/rdpwrap
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments