MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fae5d87e8771f0025e306697f68afe511275e9772af23dfd081ffbfc0b56f38d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AveMariaRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: fae5d87e8771f0025e306697f68afe511275e9772af23dfd081ffbfc0b56f38d
SHA3-384 hash: 29828ddb54b77830d1da96ea3cb1ef7804e68c39eb1f45bbfb409b5c0a35a15fe155bf7c1b0143bf4ad4034f98879737
SHA1 hash: f53307dd3ea7e7dfeba1dbd6aa33ffabb3aed628
MD5 hash: 3349ba62142880bbe6e35dd4a9be5981
humanhash: rugby-four-triple-diet
File name:FIRM ORDER _ 2020-1-32410 21981XMH.bin
Download: download sample
Signature AveMariaRAT
File size:1'929'008 bytes
First seen:2020-07-07 06:12:08 UTC
Last seen:2020-07-07 07:22:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9f2de36faf921ad0c138b3f99bf41cbc (2 x FormBook, 2 x NetWire, 1 x AveMariaRAT)
ssdeep 49152:nMPdZHquVYhlOhd0BnxqS1RUVAZoHaIM:nMV6Cd0rDZhI
Threatray 448 similar samples on MalwareBazaar
TLSH 6C95CF62F2C2FA3FC3F68AFC987A16941A14FE402615DC8A55F87E69C9B1600F5D3319
Reporter JAMESWT_WT
Tags:avemaria AveMariaRAT

Code Signing Certificate

Organisation:Microsoft Windows
Issuer:Microsoft Windows Production PCA 2011
Algorithm:sha256WithRSAEncryption
Valid from:Mar 4 18:30:40 2020 GMT
Valid to:Mar 3 18:30:40 2021 GMT
Serial number: 33000002689ACC74C3B73DBA47000000000268
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 572364FC8CDB6F8FFBECA49E7B209FBC77EA729E038F7A7A9B91E6201B667D7F
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Backdoor.NetWiredRc
Status:
Malicious
First seen:
2020-07-07 06:14:06 UTC
File Type:
PE (Exe)
Extracted files:
54
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments