MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fb55340ef36d5bfae56dd84e51b9aff7996ab7428fd1fcbe53dfb8fdcda244e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AveMariaRAT
Vendor detections: 13
| SHA256 hash: | fb55340ef36d5bfae56dd84e51b9aff7996ab7428fd1fcbe53dfb8fdcda244e8 |
|---|---|
| SHA3-384 hash: | 34b9ae248e6c824501a9ef598d500225de6d7a74c842a862ff446fc218da0a3a431fcedf84cf0e3ff3263bbee7430cd6 |
| SHA1 hash: | c8a0ba42f8076b5c2b0d4cd2e0e6225b509b9f0c |
| MD5 hash: | b858a1f896ba459493486676e59af5ad |
| humanhash: | papa-pennsylvania-bravo-artist |
| File name: | b858a1f896ba459493486676e59af5ad |
| Download: | download sample |
| Signature | AveMariaRAT |
| File size: | 156'160 bytes |
| First seen: | 2021-07-30 08:22:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b9494f92817e4dfbe294ad842e8f1988 (37 x AveMariaRAT) |
| ssdeep | 3072:4NLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5:4NLYdT97JSIFl0QENqF |
| Threatray | 1'672 similar samples on MalwareBazaar |
| TLSH | T11CE37C327BE188B9E6F6013109F53F39CB7DF93111208AAB63905A468D37ACDE955783 |
| Reporter | |
| Tags: | 32 AveMariaRAT exe |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://api.telegram.org/bot1846926808:AAGk2IzxSb5N5fdYKiaTr2kIA9QAdWBcb1Y/sendMessage?chat_id=1407381447
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AveMaria_WarZone |
|---|
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
| Rule name: | INDICATOR_SUSPICOIUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | MALWARE_Win_AveMaria |
|---|---|
| Author: | ditekSHen |
| Description: | AveMaria variant payload |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MALWARE_Win_WarzoneRAT |
|---|---|
| Author: | ditekSHen |
| Description: | Detects AveMaria/WarzoneRAT |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pe_imphash |
|---|
| Rule name: | RDPWrap |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies RDP Wrapper, sometimes used by attackers to maintain persistence. |
| Reference: | https://github.com/stascorp/rdpwrap |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Telegram_Exfiltration_Via_Api |
|---|---|
| Author: | lsepaolo |
| Rule name: | win_ave_maria_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.ave_maria. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://hutyrtit.ydns.eu/microf.exe