MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dadb93eb5dce5024788d541cf33c838388d83ce2452a7ba8870a5e0e36cfd961. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: dadb93eb5dce5024788d541cf33c838388d83ce2452a7ba8870a5e0e36cfd961
SHA3-384 hash: 51002295933384ba341a7a4f466884c0019754f7eece82ee2079a13b5b1155fe0cb569dd5b42c172594689ff49284be2
SHA1 hash: 5fc48e7c3737b70f07b6336a37dcdc410fb3ebf5
MD5 hash: 8de0c7d26ac631898cf5c20c9c9ea471
humanhash: north-king-delta-nineteen
File name:PurchaseorderContract.rar
Download: download sample
Signature AveMariaRAT
File size:212'431 bytes
First seen:2020-06-12 06:45:17 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 3072:ilySv8sFlB/51lDJ4RxN2qxUKoZzc3POE8AfpVgqvNcL7ShX7M9cCtAjOa6Mq+A/:iYu94QqOdZzKByIta9GCaGMWmMF4+
TLSH 7524237320F08BECA912894F0166F89A9BBC0D67A13CA7F5DDE29B509B701718D51DC7
Reporter abuse_ch
Tags:AveMariaRAT nVpn rar RAT


Avatar
abuse_ch
Malspam distributing AveMariaRAT:

HELO: 162-144-78-202.unifiedlayer.com
Sending IP: 162.144.78.202
From: Fumi Eriko <smtpf0x-2dyly@carajkumar.com>
Reply-To: fumieriko0221@gmail.com
Subject: Purchase Agreement Contract And Sample
Attachment: PurchaseorderContract.rar (contains "PurchaseorderContract.exe")

Payload URL:
http://service-oreoo-27.loan/netcrp.exe

RAT C2:
nasas.dnsupdate.info:5200 (79.134.225.114)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-12 06:47:04 UTC
AV detection:
21 of 31 (67.74%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AveMariaRAT

rar dadb93eb5dce5024788d541cf33c838388d83ce2452a7ba8870a5e0e36cfd961

(this sample)

  
Dropping
AveMariaRAT
  
Delivery method
Distributed via e-mail attachment

Comments