MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 882d3aaa507d5340258272b1b39c8d603776eda51124e2c443ae8ea1edc2059b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 12
| SHA256 hash: | 882d3aaa507d5340258272b1b39c8d603776eda51124e2c443ae8ea1edc2059b |
|---|---|
| SHA3-384 hash: | 7522d916671e60649d12de8cccb9347fe86d34a62bb971816bb6c8026efbe8af89cefc92f2eee1f84013e192d31b4464 |
| SHA1 hash: | 452a05e881a94a0a27d7c8f3258832b2813a2783 |
| MD5 hash: | c5d1844bc3c837f0b05279a9d4d9c2ad |
| humanhash: | asparagus-oranges-bravo-kitten |
| File name: | Sandra-Wohl-Bewerbung-Lebenslauf.exe |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 101'888 bytes |
| First seen: | 2022-10-19 02:39:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner) |
| ssdeep | 1536:/7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfEwrOpJ0HWIZOl:z7DhdC6kzWypvaQ0FxyNTBfEAOpX |
| Threatray | 2'974 similar samples on MalwareBazaar |
| TLSH | T150A37E41F3E142F7EAF2053100A6766FD73662289724A8DBC74C3E529913AD1A73D3E9 |
| TrID | 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 12.7% (.EXE) Win64 Executable (generic) (10523/12/4) 7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 6cecccdcd4d0e8f0 (4 x AveMariaRAT, 1 x Smoke Loader, 1 x GuLoader) |
| Reporter | |
| Tags: | AveMariaRAT exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
255
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sandra-Wohl-Bewerbung-Lebenslauf.exe
Verdict:
Malicious activity
Analysis date:
2022-10-19 06:22:33 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Forced system process termination
Launching a process
Sending an HTTP GET request
Creating a file
Using the Windows Management Instrumentation requests
Modifying a system executable file
Launching cmd.exe command interpreter
Launching a tool to kill processes
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
No Threat
Threat level:
2/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Babadeda
Detection:
malicious
Classification:
troj.adwa.expl
Score:
96 / 100
Signature
Antivirus detection for dropped file
Drops PE files to the startup folder
Drops script or batch files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Yara detected Babadeda
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Warzonerat
Status:
Malicious
First seen:
2022-10-19 02:57:57 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
14 of 26 (53.85%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 2'964 additional samples on MalwareBazaar
Result
Malware family:
warzonerat
Score:
10/10
Tags:
family:eternity family:warzonerat evasion infostealer persistence ransomware rat trojan upx
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies Control Panel
Modifies registry class
NTFS ADS
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Sets desktop wallpaper using registry
Adds Run key to start application
Checks computer location settings
Drops startup file
Loads dropped DLL
Disables Task Manager via registry modification
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Warzone RAT payload
Eternity
Modifies Windows Defender Real-time Protection settings
Modifies security service
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
111.90.151.174:5200
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
6a0746b9522a062012cd1d8201fb3cf395bbc67e8feef1c1ec41661fb66d0424
MD5 hash:
9a9f89aa249132e1b2b8f168e0c3f670
SHA1 hash:
90a7bce3411aff43fbe5debfecf6a4a374d44a3c
SH256 hash:
34e83cb82a3ccc8d794a76ed4aedf729e2bcac7ccb8a8e9cbcfb0a44ffb5a5d4
MD5 hash:
82a971d4bea362323b76cdc09032facd
SHA1 hash:
6cee59b1450e968e66be1d0e3e50b42c4db65129
SH256 hash:
c7f96eefd37ade5e3991acb8877977077d4dad7da01776c762c1d650588b3d3b
MD5 hash:
bd7b4498f7330681c5730bdf9a2327b3
SHA1 hash:
3fd6bdefcf0c6c05eefba78232434c0fd334b100
SH256 hash:
0f64f442674bcf1ff66c2ec718132d596ec4eb81bdd23efd2885410cb267e1f4
MD5 hash:
137b5bc44c9d0fd683039742ec8bc19a
SHA1 hash:
3363a1d9ee07df4f8c1b35f85155fd4017a403a7
SH256 hash:
afa084d15edf527f612c6fa9244d25d22f8275c727346fd87fa3849277cd2a4e
MD5 hash:
31240643c47c94ae6e6c6c72af8214b9
SHA1 hash:
c949638c2e34e8f5b8afe89433acf50a0828b4c3
SH256 hash:
750c36953066ef22703dd3345225c1256dcba7a3d34210b13ef4ef97a67c14f5
MD5 hash:
03c085a721b6f7e1ee4772d1583f6979
SHA1 hash:
a46338b45370beadbd8e1f777f53335ca1692741
SH256 hash:
e68989a936205a2b94e8411e21739b70f0ea87c0bbc6f30427e5896582d164f5
MD5 hash:
9c7387cc6e0c8d6f5e83db08c9d1f26a
SHA1 hash:
41b84b21312258b022de28fc9860ec09f34349d3
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
882d3aaa507d5340258272b1b39c8d603776eda51124e2c443ae8ea1edc2059b
MD5 hash:
c5d1844bc3c837f0b05279a9d4d9c2ad
SHA1 hash:
452a05e881a94a0a27d7c8f3258832b2813a2783
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.