

Rewterz Threat Advisory – Multiple Microsoft Products Vulnerabilities
February 19, 2024
Rewterz Threat Advisory – ICS: Multiple Siemens Products Vulnerabilities
February 19, 2024
Rewterz Threat Advisory – Multiple Microsoft Products Vulnerabilities
February 19, 2024
Rewterz Threat Advisory – ICS: Multiple Siemens Products Vulnerabilities
February 19, 2024Severity
High
Analysis Summary
AveMaria RAT – aka WarzoneRAT – is a remote access trojan that targets Windows systems that provide the capability to gain unauthorized access to a victim’s PC or allow covert surveillance of it. It acts as a keylogger, can steal passwords, escalate privileges, and much more. AveMaria, like most malware, first arrives at systems as a result of phishing emails (as invoices and shipping orders) but is also available on the dark web for subscriptions. This malware-as-a-service RAT is written in C++ and has been available for purchase since at least 2018. Once the RAT has infected a system, it establishes a backdoor that allows the attacker to control the system from a remote location.
AveMaria RAT utilizes persistence mechanisms to ensure it remains active on the infected system, even after reboots. This may involve modifying system settings, adding registry entries, or creating startup processes to ensure the malware runs automatically upon system boot-up. AveMaria RAT may have additional capabilities beyond remote access and control. These can include file manipulation, system manipulation, process manipulation, file transfer, remote shell execution, and other features that provide flexibility and control to the attacker.
AveMaria RAT is a potent tool in the hands of cybercriminals, and its deployment can lead to significant security risks and potential data breaches. Implementing strong security measures, including up-to-date antivirus software, regular system patching, and user awareness training, is essential to protect against AveMaria RAT and similar malware threats.
Impact
- Unauthorized Access
Indicators of Compromise
MD5
- 3abd65d34fbbd87ce50eaa1b0eb439d0
- 801b85a09b1f0b27058d546ce871054c
- 16cd177899279d5d2d27443286ccc41b
- 0c74bc9529b8d9f96fc7e1b47559abd1
- 08e4197b0f47a59e1061a1c30c445daa
SHA-256
- d10c74984d4c4dab2f492ab8b31013e552108e14c202b4cabe150ca230230b1e
- c3aa8cc8ada3fa6e79c32610b58ef3cbcd339faaf8e90036c285c965b0471eb6
- 3e4da5132877e955fb455e58e300b56033c07a6d2709b386fdc5c43a88e1c499
- bc7a00a440550e0b93368e5d1524e9b5a46177f26518803d85268d9d7a1cca8a
- 0923b96551a00cf7c004115637a4e0eb9d80ea8c6ab80c6515b3f3ca28bd5eb4
SHA-1
- ff225553cca948f35a0765f48b5b146f43bb4203
- 05ab1832c07425f87867b384d90500863d066637
- 91c1ee553aa8ac4cd24ef5800c6ac12da7becdee
- 232bb8f072131d66e317b1f8acb1371e999447cb
- a3c5eb519045be882bcc057f4df655789f542ee8
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.