MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 27db51f010cd9e7f83daf474ba1d78022cf61704fe114552a98d464b08383b38. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
njrat
Vendor detections: 8
| SHA256 hash: | 27db51f010cd9e7f83daf474ba1d78022cf61704fe114552a98d464b08383b38 |
|---|---|
| SHA3-384 hash: | 9a94454b3e1490fb133d5f30e947e4acab51e70535717a1e6fa03ffb8495c00049fd030dac63bdf6b0dce81d09512dc7 |
| SHA1 hash: | f694ad1cb07a98e3ede5dcd26d54f1e4d29dc3b8 |
| MD5 hash: | 8d949fe494a783d96dc2bd003de89a41 |
| humanhash: | idaho-alpha-delaware-bravo |
| File name: | 27db51f010cd9e7f83daf474ba1d78022cf61704fe114552a98d464b08383b38 |
| Download: | download sample |
| Signature | njrat |
| File size: | 8'332'288 bytes |
| First seen: | 2020-11-14 18:22:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d5d9d937853db8b666bd4b525813d7bd (40 x DCRat, 28 x njrat, 5 x RedLineStealer) |
| ssdeep | 196608:b7P/9NcSdKX8VEwb3y+9Is3/K2CBHpR1FtSeFo38U9cJ81+:XP/9GnerKQCHzCb+P |
| TLSH | 9A8633ACA49B3CF1EA14E83183615F06AF1B36B4CE7799A864463554F39FB701BE1243 |
| Reporter | |
| Tags: | NjRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Creating a process with a hidden window
DNS request
Creating a window
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching the process to change the firewall settings
Connection attempt to an infection source
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
njRat DarkComet
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Detected njRat
Drops PE files to the startup folder
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Uses netsh to modify the Windows network and firewall settings
Yara detected DarkComet
Yara detected Njrat
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.DarkComet
Status:
Malicious
First seen:
2020-11-14 18:25:26 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
evasion persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies registry class
Modifies service
Adds Run key to start application
Drops startup file
Loads dropped DLL
Checks computer location settings
Executes dropped EXE
Modifies Windows Firewall
Unpacked files
SH256 hash:
27db51f010cd9e7f83daf474ba1d78022cf61704fe114552a98d464b08383b38
MD5 hash:
8d949fe494a783d96dc2bd003de89a41
SHA1 hash:
f694ad1cb07a98e3ede5dcd26d54f1e4d29dc3b8
SH256 hash:
9343339fadfe0f62d6fd46c6131ed9fdf01978d817192984e69a8bbecfb406d2
MD5 hash:
34960f869aa933675a70c0c7c17addfe
SHA1 hash:
b01ec370b3571d70a2d111f35d5514cc7a18d422
Detections:
win_darkcomet_g0
win_darkcomet_auto
SH256 hash:
f323c647565a6ac6762379e35c499ecebe17fde2530a2ad5159310ffccbf95c9
MD5 hash:
84d4f5709947e90acdd25f594eda9509
SHA1 hash:
6bd75b358edd1275efad4664c926763b5780de5b
Detections:
win_njrat_w1
win_njrat_g1
SH256 hash:
4d5b0bb924898acc5937d9e5c373c11b19f0933e96e3d9a182fe64c683dfa5e5
MD5 hash:
e39e0912ed8f4111b85e7fa8c04cacbc
SHA1 hash:
1f89c439c4c00df08967535e6c52835d3f98cffc
SH256 hash:
561c24f9d8f8c667558a33ecef1f39cfae88f163f2618496aba96334afc3e9c5
MD5 hash:
caced8edc397df7d4fc63b6f9dc5f2e2
SHA1 hash:
b1ece378faa4f9ee8f384ca53302a0ec5c3d6073
SH256 hash:
9726b5338ad442af484457875b53125949be30443c32ae30aaa7dca745ebcb35
MD5 hash:
baae76330a8ff174be812a43455ae9e4
SHA1 hash:
240d7d440ef530009fa47489f16a2a28e8404f93
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
DarkComet
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.