Rewterz Threat Alert –DarkCrystal RAT (DCRat) – Active IOCs
June 6, 2023Rewterz Threat Alert – BluStealer Infostealer aka a310logger – Active IOCs
June 6, 2023Rewterz Threat Alert –DarkCrystal RAT (DCRat) – Active IOCs
June 6, 2023Rewterz Threat Alert – BluStealer Infostealer aka a310logger – Active IOCs
June 6, 2023Severity
High
Analysis Summary
AveMaria RAT – aka WarzoneRAT – is a remote access trojan that targets Windows systems that provides the capability to gain unauthorized access to a victim’s PC or allow covert surveillance of it. It acts as a keylogger, can steal passwords, escalate privileges, and much more. AveMaria, like most malware, first arrives at systems as a result of phishing emails (as invoices and shipping orders), but is also available on the dark web for subscriptions. This malware-as-a-service RAT is written in C++ that has been available for purchase since at least 2018. Once the RAT has infected a system, it establishes a backdoor that allows the attacker to control the system from a remote location.
AveMaria RAT utilizes persistence mechanisms to ensure it remains active on the infected system, even after reboots. This may involve modifying system settings, adding registry entries, or creating startup processes to ensure the malware runs automatically upon system boot-up. AveMaria RAT may have additional capabilities beyond remote access and control. These can include file manipulation, system manipulation, process manipulation, file transfer, remote shell execution, and other features that provide flexibility and control to the attacker.
AveMaria RAT is a potent tool in the hands of cybercriminals, and its deployment can lead to significant security risks and potential data breaches. Implementing strong security measures, including up-to-date antivirus software, regular system patching, and user awareness training, is essential to protect against AveMaria RAT and similar malware threats.
Impact
- Unauthorized Access
Indicators of Compromise
MD5
- c722653b8cec7cb63e3915b698b46c22
- c696e9569d3f38fb8884192d96cf773d
- e95b75bed4147d8cc8fb08f9910a003b
- 27c962bc41886b2fae4c822abfc796bc
SHA-256
- e3578acb20ffc36bf721b7dd819047012296ad2c5e0aa5cbacee67d17b1b4558
- 7a2eaca2ff024e822839d6c62842ccbd541e948dfbc476a8013c947d8a2385f5
- 414c47132ef2e34f5ba9cf5bc4575a991477626ed9819f30c60f99cbc78eb50d
- dbe7fdd2f0e7270387053d2955f549a46a6699b29ece6b3ff20a6bd11c06064b
SHA-1
- 721b7f738a31e88b2fbd6362404f14cb595fb686
- 7c7cc1ee1cf72f9bcff18278c280ff7ac4c6d984
- 77475a6e5ef38c54fac262defaf231875dca6458
- e14f67bfe3b1cf5e9197b5e8437b23cdb141e0d9
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets