MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f69faea7165ab34da776a4afaeb59a46c6061f58d431bc231bbab76db9e2ec4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: f69faea7165ab34da776a4afaeb59a46c6061f58d431bc231bbab76db9e2ec4c
SHA3-384 hash: 091e9e63c18147b61f261aba944ae63492441e5e4de6517db7258d4665206db02dec30df8abae85893d8ee65835e9647
SHA1 hash: 3494d3e65c320dc21fadf9b30a07559fb17fecbf
MD5 hash: d0d76dd90174c03fd72d95662a7830e1
humanhash: spring-butter-yellow-magnesium
File name:8b42ea4894ab2cbae9f9810d43833e82
Download: download sample
Signature AveMariaRAT
File size:1'396'392 bytes
First seen:2020-11-17 11:29:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3b4a52a08bd0152d124fdb84d8fb3e25 (2 x AveMariaRAT, 1 x ModiLoader)
ssdeep 24576:do/zsuNJWH+24+bEJ1et69NtE2jr4H1YY/YX:IB4HotEOTp
Threatray 606 similar samples on MalwareBazaar
TLSH 6C55BFE2E7800933F122DA7CCD7B9FD75A35BD213D2888A73AF86C5C1E766416419293
Reporter seifreed
Tags:AveMariaRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Changing a file
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Result
Verdict:
0
Threat name:
Win32.Trojan.Jacard
Status:
Malicious
First seen:
2020-11-17 11:30:31 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:modiloader family:warzonerat infostealer persistence rat trojan
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader First Stage
ModiLoader Second Stage
Warzone RAT Payload
ModiLoader, DBatLoader
WarzoneRat, AveMaria
Unpacked files
SH256 hash:
f69faea7165ab34da776a4afaeb59a46c6061f58d431bc231bbab76db9e2ec4c
MD5 hash:
d0d76dd90174c03fd72d95662a7830e1
SHA1 hash:
3494d3e65c320dc21fadf9b30a07559fb17fecbf
SH256 hash:
8c79008d2ae643e31ef03445a9a02b9ac97cfa0e77329311bd938d0f30c75b24
MD5 hash:
b0a215b69e01dff746fef7d51a92cadf
SHA1 hash:
cc857f411df20f953b5a524a923b352295666f45
SH256 hash:
c8c5774eba69c93a947995427bd6f3500cca5577622b508ea2171a70b389dc3b
MD5 hash:
95a9be6b36ccc706cd21f3aaeabfced2
SHA1 hash:
df7f63d87c67924f434daf0ee064e3b73a9683ed
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments