MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e97ad9350f9b4af8a80c4853f0380f5177be6d18505650220703387a59448577. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 5 Comments

SHA256 hash: e97ad9350f9b4af8a80c4853f0380f5177be6d18505650220703387a59448577
SHA3-384 hash: 8818221399989a3be173dd85fe3832b8b40be14957e91578f919a0b1a04bd4e2da580a566b6f63df6e2d9d0e37b8daf3
SHA1 hash: c35f5554847d1687ad00596a6b52a59f84cee920
MD5 hash: 3744d65c0e9e1890909035c3f464673c
humanhash: happy-cold-six-oven
File name:e97ad9350f9b4af8a80c4853f0380f5177be6d18505650220703387a59448577
Download: download sample
Signature AveMariaRAT
File size:260'480 bytes
First seen:2020-06-29 07:29:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 3072:nK7e6eq20s4hvkXSCJdQl//PrKt5KaUEeCJE1OAMTzA6QZki5l7AmMjkVldR:nKS/0XhvOhJdMjuGfAEwjQSi5zLHf
TLSH F744BF277298AF03CBAF15FF8081514443B1A55E7383F3CA5CD254E926D67D31AA2E8B
Reporter @JAMESWT_MHT
Tags:AveMariaRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
22
Origin country :
IT IT
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
WarzoneRAT
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2020-06-25 05:48:00 UTC
AV detection:
29 of 31 (93.55%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext

Yara Signatures


Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:Codoso_Gh0st_1
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:Codoso_Gh0st_2
Author:Florian Roth
Description:Detects Codoso APT Gh0st Malware
Reference:https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:win_ave_maria_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments