MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f5aa4fe1049ed94dbf22ad1427013a30762ebd9ac2a89726f9f313b087e2a4a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: f5aa4fe1049ed94dbf22ad1427013a30762ebd9ac2a89726f9f313b087e2a4a0
SHA3-384 hash: 2cf83a4b253de16bf9696f58144aa1004b45143604262ed9874e8880f166aae5d677fab50163cebb056c740b8695bc51
SHA1 hash: ee76c88679882ab6739c9c140d88795bb62bab15
MD5 hash: 7fd18a9ba85fc28bb80251e75ec96456
humanhash: zulu-arizona-one-six
File name:7fd18a9ba85fc28bb80251e75ec96456.exe
Download: download sample
Signature AveMariaRAT
File size:671'744 bytes
First seen:2021-02-06 08:21:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:7YtzVMgeEUb7lQLvvfqao9DlzlPtSTtpxCqme8bC:7UM2Ub7avnulXIpxCq9uC
Threatray 15 similar samples on MalwareBazaar
TLSH 6FE49D36F7619B81C038BB3B4662795C63F1F0E71331E9AB2F850AF509975908FAE149
Reporter abuse_ch
Tags:AveMariaRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5099834809.xlsx
Verdict:
Malicious activity
Analysis date:
2021-02-06 08:19:30 UTC
Tags:
encrypted exploit CVE-2017-11882 loader trojan stealer rat avemaria

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Creating a window
Running batch commands
Launching a process
Sending a UDP request
Creating a process from a recently created file
Creating a file
Creating a file in the %temp% directory
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AveMaria
Detection:
malicious
Classification:
phis.troj.adwa.spyw.evad
Score:
100 / 100
Signature
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Creates an undocumented autostart registry key
Drops PE files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Yara detected AntiVM_3
Yara detected AveMaria stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 349537 Sample: cxZ1hwj54g.exe Startdate: 06/02/2021 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for domain / URL 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 9 other signatures 2->63 8 cxZ1hwj54g.exe 15 7 2->8         started        process3 file4 47 C:\Users\user\AppData\...\notepaaaaddsss.exe, PE32 8->47 dropped 49 C:\...\notepaaaaddsss.exe:Zone.Identifier, ASCII 8->49 dropped 51 C:\Users\user\AppData\...\cxZ1hwj54g.exe.log, ASCII 8->51 dropped 73 Drops PE files to the startup folder 8->73 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->75 12 notepaaaaddsss.exe 14 5 8->12         started        16 cmd.exe 1 8->16         started        signatures5 process6 file7 53 C:\Users\user\AppData\...\notepaaaaddsss.exe, PE32 12->53 dropped 77 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->77 79 Injects a PE file into a foreign processes 12->79 18 notepaaaaddsss.exe 3 4 12->18         started        22 notepaaaaddsss.exe 2 12->22         started        25 notepaaaaddsss.exe 12->25         started        31 13 other processes 12->31 27 reg.exe 1 1 16->27         started        29 conhost.exe 16->29         started        signatures8 process9 dnsIp10 55 warzone109983runnerhacker.duckdns.org 194.5.98.5, 49738, 9040 DANILENKODE Netherlands 18->55 65 Increases the number of concurrent connection per server for Internet Explorer 18->65 67 Installs a global keyboard hook 18->67 45 C:\Users\user\...\notepaaaaddsss.exe.log, ASCII 22->45 dropped 69 Multi AV Scanner detection for dropped file 22->69 33 notepaaaaddsss.exe 22->33         started        35 notepaaaaddsss.exe 25->35         started        71 Creates an undocumented autostart registry key 27->71 37 notepaaaaddsss.exe 31->37         started        39 notepaaaaddsss.exe 31->39         started        41 notepaaaaddsss.exe 31->41         started        43 9 other processes 31->43 file11 signatures12 process13
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-06 08:22:10 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat infostealer persistence ransomware rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Drops startup file
Loads dropped DLL
Executes dropped EXE
Warzone RAT Payload
Modifies WinLogon for persistence
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
f5aa4fe1049ed94dbf22ad1427013a30762ebd9ac2a89726f9f313b087e2a4a0
MD5 hash:
7fd18a9ba85fc28bb80251e75ec96456
SHA1 hash:
ee76c88679882ab6739c9c140d88795bb62bab15
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AveMariaRAT

Executable exe f5aa4fe1049ed94dbf22ad1427013a30762ebd9ac2a89726f9f313b087e2a4a0

(this sample)

  
Delivery method
Distributed via web download

Comments