MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab261adafcaa48f8a9472a46e105f3a1a89f6b0291555e14448e445e058b9cc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: ab261adafcaa48f8a9472a46e105f3a1a89f6b0291555e14448e445e058b9cc6
SHA3-384 hash: 411256f744bc61d9cf2be8309e32741ac6dd6f6a58b598c9c5280ac43524f2fae8a3c5d5a5b6cd19f6a99b9a2968651c
SHA1 hash: 4a31e2c8b5362300f8a0f77523c313954b89d7ba
MD5 hash: fff945c817bc37dfc7d9da5129f10d7c
humanhash: papa-don-spaghetti-alpha
File name:TNT INVOICE AND PACKING LIST_1.exe
Download: download sample
Signature AveMariaRAT
File size:1'619'248 bytes
First seen:2020-07-09 13:35:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9a50e73bc75a3005fac729605bdf4c02 (3 x FormBook, 3 x RemcosRAT, 2 x AveMariaRAT)
ssdeep 24576:Vfw9DKth3NQFoDLrkXgtYRlAslz8ghtuMN0BnT1qZwXh/xhR3PKiFdqVOjZU0JIC:Vd6Nhd0BnxqS1RUVAZoHaIM
Threatray 462 similar samples on MalwareBazaar
TLSH 3275CF32F2D1F63EC3BE5AF48CB9AA541919BE402A10DC8E61F53D69C932505F4E335A
Reporter James_inthe_box
Tags:AveMariaRAT exe

Code Signing Certificate

Organisation:Microsoft Windows
Issuer:Microsoft Windows Production PCA 2011
Algorithm:sha256WithRSAEncryption
Valid from:Mar 4 18:30:40 2020 GMT
Valid to:Mar 3 18:30:40 2021 GMT
Serial number: 33000002689ACC74C3B73DBA47000000000268
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 572364FC8CDB6F8FFBECA49E7B209FBC77EA729E038F7A7A9B91E6201B667D7F
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Exploit.BypassUac
Status:
Malicious
First seen:
2020-07-09 13:34:50 UTC
File Type:
PE (Exe)
Extracted files:
75
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments