MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 defe5a24ac909cc14b06b49ea8574ee1bc964569bf1d18d56d3dd4398daffcde. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OzoneRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: defe5a24ac909cc14b06b49ea8574ee1bc964569bf1d18d56d3dd4398daffcde
SHA3-384 hash: d8792238d6e3133e2c425ac315ea0e6a02c7199a9ecf91719f853c0306814226308ae3f70d63980ee9de44b232f46e6b
SHA1 hash: 543f4046f7baf2b26f91ed7478dfac8e8ec160a2
MD5 hash: 357e95c47c4b8666b0fe33277a37f376
humanhash: enemy-earth-jersey-rugby
File name:357e95c47c4b8666b0fe33277a37f376
Download: download sample
Signature OzoneRAT
File size:516'096 bytes
First seen:2021-06-22 07:42:00 UTC
Last seen:2021-06-22 10:39:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ae1ab9eab27f58657ef80ff5383533d0 (1 x OzoneRAT)
ssdeep 6144:N2qZ9/jctn4K2dp2d7kw2Wzoajo0vSbSbBAhl5VoTeJHOKlcUNc+eB:N1JcBafw2IjX6+A5VCCHOK9O+e
Threatray 5'172 similar samples on MalwareBazaar
TLSH 8AB49D11BAB1E901E5E916701CAAD1FC9223BD2ADE43465B31CC376F3B32F219D64752
Reporter zbetcheckin
Tags:32 exe OzoneRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
357e95c47c4b8666b0fe33277a37f376
Verdict:
Malicious activity
Analysis date:
2021-06-22 07:42:30 UTC
Tags:
trojan rat netwire ozone

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Staser
Status:
Malicious
First seen:
2021-06-22 03:39:22 UTC
AV detection:
9 of 46 (19.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
defe5a24ac909cc14b06b49ea8574ee1bc964569bf1d18d56d3dd4398daffcde
MD5 hash:
357e95c47c4b8666b0fe33277a37f376
SHA1 hash:
543f4046f7baf2b26f91ed7478dfac8e8ec160a2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_ozone_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

OzoneRAT

Executable exe defe5a24ac909cc14b06b49ea8574ee1bc964569bf1d18d56d3dd4398daffcde

(this sample)

Comments