SYMBOLCOMMON_NAMEaka. SYNONYMS
win.ave_maria (Back to overview)

Ave Maria

aka: AVE_MARIA, AveMariaRAT, Warzone RAT, avemaria

Actor(s): Anunak


Information stealer which uses AutoIT for wrapping.

References
2020-09-02Cisco TalosHolger Unterbrink, Edmund Brumaghin
@online{unterbrink:20200902:salfram:74ae3c9, author = {Holger Unterbrink and Edmund Brumaghin}, title = {{Salfram: Robbing the place without removing your name tag}}, date = {2020-09-02}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2020/09/salfram-robbing-place-without-removing.html}, language = {English}, urldate = {2020-09-03} } Salfram: Robbing the place without removing your name tag
Ave Maria ISFB SmokeLoader Zloader
2020-07-30SpamhausSpamhaus Malware Labs
@techreport{labs:20200730:spamhaus:038546d, author = {Spamhaus Malware Labs}, title = {{Spamhaus Botnet Threat Update Q2 2020}}, date = {2020-07-30}, institution = {Spamhaus}, url = {https://www.spamhaus.org/news/images/botnet-report-2020-q2/2020-q2-spamhaus-botnet-threat-report.pdf}, language = {English}, urldate = {2020-07-30} } Spamhaus Botnet Threat Update Q2 2020
AdWind Agent Tesla Arkei Stealer AsyncRAT Ave Maria Azorult DanaBot Emotet IcedID ISFB KPOT Stealer Loki Password Stealer (PWS) Nanocore RAT NetWire RC NjRAT Pony Raccoon RedLine Stealer Remcos Zloader
2020-05-21MalwarebytesMalwarebytes Labs
@techreport{labs:20200521:cybercrime:d38d2da, author = {Malwarebytes Labs}, title = {{Cybercrime tactics and techniques}}, date = {2020-05-21}, institution = {Malwarebytes}, url = {https://resources.malwarebytes.com/files/2020/05/CTNT_Q1_2020_COVID-Report_Final.pdf}, language = {English}, urldate = {2020-06-03} } Cybercrime tactics and techniques
Ave Maria Azorult DanaBot Loki Password Stealer (PWS) NetWire RC
2020-02-03Check Point ResearchYaroslav Harakhavik
@online{harakhavik:20200203:warzone:18606cf, author = {Yaroslav Harakhavik}, title = {{Warzone: Behind the enemy lines}}, date = {2020-02-03}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/warzone-behind-the-enemy-lines/}, language = {English}, urldate = {2020-02-03} } Warzone: Behind the enemy lines
Ave Maria
2019-07-25Team CymruTeam Cymru
@online{cymru:20190725:unmasking:91638f6, author = {Team Cymru}, title = {{Unmasking AVE_MARIA}}, date = {2019-07-25}, organization = {Team Cymru}, url = {https://blog.team-cymru.com/2019/07/25/unmasking-ave_maria/}, language = {English}, urldate = {2020-01-08} } Unmasking AVE_MARIA
Ave Maria
2019-05-08Kaspersky LabsYury Namestnikov, Félix Aime
@online{namestnikov:20190508:fin75:443b111, author = {Yury Namestnikov and Félix Aime}, title = {{FIN7.5: the infamous cybercrime rig “FIN7” continues its activities}}, date = {2019-05-08}, organization = {Kaspersky Labs}, url = {https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/}, language = {English}, urldate = {2019-12-20} } FIN7.5: the infamous cybercrime rig “FIN7” continues its activities
Griffon Ave Maria Anunak
2019-05-08Kaspersky LabsKaspersky Labs
@online{labs:20190508:fin7:6874fc6, author = {Kaspersky Labs}, title = {{Fin7 hacking group targets more than 130 companies after leaders’ arrest}}, date = {2019-05-08}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/about/press-releases/2019_fin7-hacking-group-targets-more-than-130-companies-after-leaders-arrest}, language = {English}, urldate = {2020-03-22} } Fin7 hacking group targets more than 130 companies after leaders’ arrest
Ave Maria ANTHROPOID SPIDER
2019-04-11ReaqtaReaqta
@online{reaqta:20190411:avemaria:d6cd904, author = {Reaqta}, title = {{Ave_Maria Malware: there's more than meets the eye}}, date = {2019-04-11}, organization = {Reaqta}, url = {https://reaqta.com/2019/04/ave_maria-malware-part1/}, language = {English}, urldate = {2020-01-07} } Ave_Maria Malware: there's more than meets the eye
Ave Maria
2019-03-01MorphisecAlon Groisman
@online{groisman:20190301:threat:aaf612e, author = {Alon Groisman}, title = {{Threat Alert: AVE Maria infostealer on the rise}}, date = {2019-03-01}, organization = {Morphisec}, url = {http://blog.morphisec.com/threat-alert-ave-maria-infostealer-on-the-rise-with-new-stealthier-delivery}, language = {English}, urldate = {2020-01-09} } Threat Alert: AVE Maria infostealer on the rise
Ave Maria
2019-01-11Cybaze-Yorio Z-LabAntonio Farina, Luca Mella, Antonio Pirozzi
@online{farina:20190111:avemaria:a3fd77c, author = {Antonio Farina and Luca Mella and Antonio Pirozzi}, title = {{The “AVE_MARIA” Malware}}, date = {2019-01-11}, organization = {Cybaze-Yorio Z-Lab}, url = {https://blog.yoroi.company/research/the-ave_maria-malware/}, language = {English}, urldate = {2019-11-26} } The “AVE_MARIA” Malware
Ave Maria
Yara Rules
[TLP:WHITE] win_ave_maria_auto (20200817 | autogenerated rule brought to you by yara-signator)
rule win_ave_maria_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-08-17"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria"
        malpedia_rule_date = "20200817"
        malpedia_hash = "8c895fd01eccb47a6225bcb1a3ba53cbb98644c5"
        malpedia_version = "20200817"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 03c8 8955f0 8b458c 03cb 8bd8 894df4 c1c008 }
            // n = 7, score = 200
            //   03c8                 | add                 ecx, eax
            //   8955f0               | mov                 dword ptr [ebp - 0x10], edx
            //   8b458c               | mov                 eax, dword ptr [ebp - 0x74]
            //   03cb                 | add                 ecx, ebx
            //   8bd8                 | mov                 ebx, eax
            //   894df4               | mov                 dword ptr [ebp - 0xc], ecx
            //   c1c008               | rol                 eax, 8

        $sequence_1 = { ff15???????? 33c0 40 c9 c3 c3 55 }
            // n = 7, score = 200
            //   ff15????????         |                     
            //   33c0                 | xor                 eax, eax
            //   40                   | inc                 eax
            //   c9                   | leave               
            //   c3                   | ret                 
            //   c3                   | ret                 
            //   55                   | push                ebp

        $sequence_2 = { 8bf9 ff15???????? 6a00 6a24 8d85d0fdffff 50 ff15???????? }
            // n = 7, score = 200
            //   8bf9                 | mov                 edi, ecx
            //   ff15????????         |                     
            //   6a00                 | push                0
            //   6a24                 | push                0x24
            //   8d85d0fdffff         | lea                 eax, [ebp - 0x230]
            //   50                   | push                eax
            //   ff15????????         |                     

        $sequence_3 = { 50 8d4da4 e8???????? 8b4dbc e8???????? 8b8d78ffffff 895dbc }
            // n = 7, score = 200
            //   50                   | push                eax
            //   8d4da4               | lea                 ecx, [ebp - 0x5c]
            //   e8????????           |                     
            //   8b4dbc               | mov                 ecx, dword ptr [ebp - 0x44]
            //   e8????????           |                     
            //   8b8d78ffffff         | mov                 ecx, dword ptr [ebp - 0x88]
            //   895dbc               | mov                 dword ptr [ebp - 0x44], ebx

        $sequence_4 = { 5b c9 c20400 8b01 c3 832100 }
            // n = 6, score = 200
            //   5b                   | pop                 ebx
            //   c9                   | leave               
            //   c20400               | ret                 4
            //   8b01                 | mov                 eax, dword ptr [ecx]
            //   c3                   | ret                 
            //   832100               | and                 dword ptr [ecx], 0

        $sequence_5 = { 8b432c 8d4dc4 03c6 50 e8???????? 8d45c4 50 }
            // n = 7, score = 200
            //   8b432c               | mov                 eax, dword ptr [ebx + 0x2c]
            //   8d4dc4               | lea                 ecx, [ebp - 0x3c]
            //   03c6                 | add                 eax, esi
            //   50                   | push                eax
            //   e8????????           |                     
            //   8d45c4               | lea                 eax, [ebp - 0x3c]
            //   50                   | push                eax

        $sequence_6 = { 8d8d2cffffff e8???????? ff75ca 8b4de8 ff75c0 ff75c4 ff7508 }
            // n = 7, score = 200
            //   8d8d2cffffff         | lea                 ecx, [ebp - 0xd4]
            //   e8????????           |                     
            //   ff75ca               | push                dword ptr [ebp - 0x36]
            //   8b4de8               | mov                 ecx, dword ptr [ebp - 0x18]
            //   ff75c0               | push                dword ptr [ebp - 0x40]
            //   ff75c4               | push                dword ptr [ebp - 0x3c]
            //   ff7508               | push                dword ptr [ebp + 8]

        $sequence_7 = { ff15???????? ff75f8 ff15???????? 68???????? 68???????? e8???????? 85c0 }
            // n = 7, score = 200
            //   ff15????????         |                     
            //   ff75f8               | push                dword ptr [ebp - 8]
            //   ff15????????         |                     
            //   68????????           |                     
            //   68????????           |                     
            //   e8????????           |                     
            //   85c0                 | test                eax, eax

        $sequence_8 = { e8???????? 50 56 8d4b10 e8???????? 5f }
            // n = 6, score = 200
            //   e8????????           |                     
            //   50                   | push                eax
            //   56                   | push                esi
            //   8d4b10               | lea                 ecx, [ebx + 0x10]
            //   e8????????           |                     
            //   5f                   | pop                 edi

        $sequence_9 = { 8945d0 8bc2 33c6 894df8 33c7 c1c105 034dd0 }
            // n = 7, score = 200
            //   8945d0               | mov                 dword ptr [ebp - 0x30], eax
            //   8bc2                 | mov                 eax, edx
            //   33c6                 | xor                 eax, esi
            //   894df8               | mov                 dword ptr [ebp - 8], ecx
            //   33c7                 | xor                 eax, edi
            //   c1c105               | rol                 ecx, 5
            //   034dd0               | add                 ecx, dword ptr [ebp - 0x30]

    condition:
        7 of them and filesize < 237568
}
Download all Yara Rules