Rewterz Threat Alert – Young Hackers from Lapsus$ Gang Convicted in High-Profile Cyberattack Cases
August 25, 2023Rewterz Threat Advisory – CVE-2023-41080 – Apache Tomcat Vulnerability
August 28, 2023Rewterz Threat Alert – Young Hackers from Lapsus$ Gang Convicted in High-Profile Cyberattack Cases
August 25, 2023Rewterz Threat Advisory – CVE-2023-41080 – Apache Tomcat Vulnerability
August 28, 2023Severity
High
Analysis Summary
AveMaria RAT – aka WarzoneRAT – is a remote access trojan that targets Windows systems that provides the capability to gain unauthorized access to a victim’s PC or allow covert surveillance of it. It acts as a keylogger, can steal passwords, escalate privileges, and much more. AveMaria, like most malware, first arrives at systems as a result of phishing emails (as invoices and shipping orders), but is also available on the dark web for subscriptions. This malware-as-a-service RAT is written in C++ that has been available for purchase since at least 2018. Once the RAT has infected a system, it establishes a backdoor that allows the attacker to control the system from a remote location.
AveMaria RAT utilizes persistence mechanisms to ensure it remains active on the infected system, even after reboots. This may involve modifying system settings, adding registry entries, or creating startup processes to ensure the malware runs automatically upon system boot-up. AveMaria RAT may have additional capabilities beyond remote access and control. These can include file manipulation, system manipulation, process manipulation, file transfer, remote shell execution, and other features that provide flexibility and control to the attacker.
AveMaria RAT is a potent tool in the hands of cybercriminals, and its deployment can lead to significant security risks and potential data breaches. Implementing strong security measures, including up-to-date antivirus software, regular system patching, and user awareness training, is essential to protect against AveMaria RAT and similar malware threats.
Impact
- Unauthorized Access
Indicators of Compromise
MD5
- 4bdda5eb7eb63d9db47ccc313fab0005
- b9914cd3537e25bb260ed8c379ed7b6d
- 0e5aa77031459c9c48cf2fa298677656
- 2f464a9bcfe09d2ab8ae6081d1d4d13a
- a34e9d45482af9e20fca8c6e68908964
SHA-256
- e360dcf6f40f9eb2ae5ceb98825ca3c8942fe935463594cfcf9c29ccd7f28707
- 61581b67f22c8a59d322641223d954d5dc5ff4d710241fa0b459037648038cdf
- 7814c75c9ddfebea34123a885417c971802505f045ed5c0103a9762b83200656
- bd54c011fb60ffa1cc97173178ffba67c3feeaaa9ca0fbfd08b201988a21e9d6
- 75ff5e50641de3d87b26fd80cba3c73e2cadf6ee818e6c748a25399c457eb3f3
SHA-1
- 78a870be0801f05089947dfad4cc4248e0413a1a
- c17edfc747ab3b69fca05bfaf870906d1c8b0deb
- 441d43e583d891907bc932b1b9adb611e44b6660
- 9bcf132b6bda81f29a73dfb32e847f2cc13d1105
- 8485533c26dcc7d2cc21a679dae316832ad2c59d
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets