ThreatFox IOC Database

You are viewing the ThreatFox database entry for ip:port 51.75.209.232:5200.

Database Entry


IOC ID:839458
IOC: 51.75.209.232:5200
IOC Type :ip:port
Threat Type :botnet_cc
Malware: Ave Maria
Malware alias:AVE_MARIA, AveMariaRAT, Warzone RAT, WarzoneRAT, avemaria
Confidence Level : Confidence level is high (100%)
ASN:AS16276 OVH
Country:- FR
First seen:2022-07-25 15:09:27 UTC
Last seen:2023-09-27 13:53:32 UTC
UUID:c6fb10bb-0c2b-11ed-a116-42010aa4000a
Reporter AndreGironda
Reward 5 credits from ThreatFox
Tags:ave maria AveMaria AveMariaRAT warzonerat
Reference: https://tria.ge/220725-rsz24aehcn

Avatar
AndreGironda
MITRE T1566.001
Date: 25 Jul 2022 05:30-06:00 -0700
Received: from mageneet.com (208.67.105.34)
From: "SASCO INTERNATIONAL TRADING L.L.C" <accounts@sascojet.com>
Subject: FW: RE: FAS03 - MT103 Payment Swift
Message-ID: <20220725054323.36C2B359E235464B@sascojet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_0012_2845A0E0.49AF7D96"
Return-Path: office@mageneet.com
Attachment Name: Payment Swift.zip
Zipfile SHA256: 6d552334a6dc6e56bc0a8f27f85e698972a4f672b8326198e8f59a38de3f697b
Unzipped Executable Name: Payment Swift.exe
Executable SHA256: 61d43a20936f0a0ed8a535e4eb21535009b271f91e62200b29c92dc46d731c64
AveMaria Unpacked Executable SHA256: 122fa34b3d7056f75429836ac9d6c2fdba192673979086be95a4037c2fa5d3ad

Malware Samples


The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).

Time stamp (UTC)SHA256 hashBazaar
2022-08-30 10:39:03 0f05dc006ea6293412d2d18930b1c2aae9cc5099edd93620501c92059c77f243