MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95c41c6ee9cd2e127689d0b2ff0378b94e5175299cce36113cca71a9671e6e02. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 95c41c6ee9cd2e127689d0b2ff0378b94e5175299cce36113cca71a9671e6e02
SHA3-384 hash: 9f4e802d0e86577ed606e3353d2490578148dd76dbb841fd59030ffcd3f08876de293c625041648218ddd5f0d6ac7164
SHA1 hash: 53772893a1f8e56a05718cf91120b8e444448499
MD5 hash: 4007253c137ecb70dfbaf6ee667bb6b6
humanhash: eight-nuts-early-eight
File name:QT_0000975242_0091876.JPG.Z
Download: download sample
Signature AveMariaRAT
File size:404'408 bytes
First seen:2020-12-07 19:34:30 UTC
Last seen:Never
File type: z
MIME type:application/x-rar
ssdeep 12288:pEyBjTUn8UOaS7uAMv9bFU+B6Wo80Rdu6WIQSzETss:9BHdq+/Mu+4W+Rdu6Wgu
TLSH 7A8423C4AA1FB8086CE82FAED7D2A1799161C1CC54E3F06BC139D85BF32069116F7E91
Reporter abuse_ch
Tags:AveMariaRAT nVpn RAT z


Avatar
abuse_ch
Malspam distributing AveMariaRAT:

HELO: viettelidc.com.vn
Sending IP: 103.1.208.228
From: Yahoo <duong@hagaco.net>
Subject: REQUEST FOR QUOTATION FURNITURE
Attachment: QT_0000975242_0091876.JPG.Z (contains "QT_0000975242_0091876.exe")

AveMariaRAT C2:
1988life.myq-see.com:1988 (185.140.53.175)

Pointing to nVpn:

% Information related to '185.140.53.0 - 185.140.53.255'

% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'

inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-EU
country: EU
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-11-06T23:02:44Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-07 19:35:06 UTC
AV detection:
11 of 48 (22.92%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AveMariaRAT

z 95c41c6ee9cd2e127689d0b2ff0378b94e5175299cce36113cca71a9671e6e02

(this sample)

  
Dropping
AveMariaRAT
  
Delivery method
Distributed via e-mail attachment

Comments