ThreatFox IOC Database
You are viewing the ThreatFox database entry for ip:port 51.75.209.232:5200.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-26 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 839458 |
|---|---|
| IOC: | 51.75.209.232:5200 |
| IOC Type : | ip:port |
| Threat Type : | botnet_cc |
| Malware: | Ave Maria |
| Malware alias: | AVE_MARIA, AveMariaRAT, Warzone RAT, WarzoneRAT, avemaria |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS16276 OVH |
| Country: | FR |
| First seen: | 2022-07-25 15:09:27 UTC |
| Last seen: | 2023-09-27 13:53:32 UTC |
| UUID: | c6fb10bb-0c2b-11ed-a116-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | ave maria AveMaria AveMariaRAT warzonerat |
| Reference: | https://tria.ge/220725-rsz24aehcn |
AndreGironda
MITRE T1566.001Date: 25 Jul 2022 05:30-06:00 -0700
Received: from mageneet.com (208.67.105.34)
From: "SASCO INTERNATIONAL TRADING L.L.C" <accounts@sascojet.com>
Subject: FW: RE: FAS03 - MT103 Payment Swift
Message-ID: <20220725054323.36C2B359E235464B@sascojet.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_0012_2845A0E0.49AF7D96"
Return-Path: office@mageneet.com
Attachment Name: Payment Swift.zip
Zipfile SHA256: 6d552334a6dc6e56bc0a8f27f85e698972a4f672b8326198e8f59a38de3f697b
Unzipped Executable Name: Payment Swift.exe
Executable SHA256: 61d43a20936f0a0ed8a535e4eb21535009b271f91e62200b29c92dc46d731c64
AveMaria Unpacked Executable SHA256: 122fa34b3d7056f75429836ac9d6c2fdba192673979086be95a4037c2fa5d3ad
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2022-08-30 10:39:03 | 0f05dc006ea6293412d2d18930b1c2aae9cc5099edd93620501c92059c77f243 |
FR