MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0c16d7dd39f3e0c3972b5c19de8e9daeb031d3ce55a6329a0ce76271904d078. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: d0c16d7dd39f3e0c3972b5c19de8e9daeb031d3ce55a6329a0ce76271904d078
SHA3-384 hash: 622ee183d41f3d4e60d1cafd42ccfe21936f24501c36fb3a837829eb3cb789bbb36d38aea7f78873e70349fd1c045243
SHA1 hash: 1a502edbe971dc48f65b0d7233658930d6933f08
MD5 hash: a3ec5b88a92b9bfbf9b2c6f835c5d6ee
humanhash: magazine-lima-eighteen-mike
File name:SIGNED CONFIRM PO.exe
Download: download sample
Signature AveMariaRAT
File size:495'104 bytes
First seen:2020-06-22 09:42:38 UTC
Last seen:2020-06-22 10:39:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b00995446d43819b40794f03e56d1925 (4 x AveMariaRAT)
ssdeep 12288:q8HX0EA3CwR/o0Kzst4LrFbvyywBTNdAL0++1:q+N0KS4vFbvIpNuL
Threatray 514 similar samples on MalwareBazaar
TLSH 2EB44AF8EA42C876D667383102D49B7F84FE2FCC4C6A35AA467508361E270D2D6357E6
Reporter abuse_ch
Tags:AveMariaRAT exe nVpn RAT


Avatar
abuse_ch
Malspam distributing AveMariaRAT:

HELO: vpssuryadata.com
Sending IP: 103.65.236.155
From: purchasing.kmm@karyamakmurmanggala.com
Subject: Re: Requested for Quotation
Attachment: SIGNED CONFIRM PO.lzh (contains "SIGNED CONFIRM PO.exe")

AveMariaRAT C2:
king222.ddns.net:2419 (79.134.225.75)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
2
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Avemariarat
Status:
Malicious
First seen:
2020-06-22 09:44:05 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
NTFS ADS
Suspicious use of WriteProcessMemory
Adds Run entry to start application
Drops startup file
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Codoso_Gh0st_2
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:win_ave_maria_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

f6651b70a53e70fc1e40e9dca4992cf7

AveMariaRAT

Executable exe d0c16d7dd39f3e0c3972b5c19de8e9daeb031d3ce55a6329a0ce76271904d078

(this sample)

  
Dropped by
MD5 f6651b70a53e70fc1e40e9dca4992cf7
  
Delivery method
Distributed via e-mail attachment

Comments