MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 372618e3d38fff25fcfbb51f9144b0c9493edf8de00684bf218b9d8b3d37dc25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 15


Intelligence 15 IOCs YARA 20 File information Comments

SHA256 hash: 372618e3d38fff25fcfbb51f9144b0c9493edf8de00684bf218b9d8b3d37dc25
SHA3-384 hash: f41b7c123c4787d5280b5100455c9f3ee0b5636e7226271ccfa3b02ca8e52604b918df7e365d6eef05a342e20266de97
SHA1 hash: 1cb0e3054bd3cae1a76b673f02c7429812bf7c5b
MD5 hash: 8dae7017994a053309640bc727791b9a
humanhash: juliet-alabama-wisconsin-freddie
File name:RCEdll.exe
Download: download sample
Signature njrat
File size:321'024 bytes
First seen:2025-05-26 01:13:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 6144:Hb6kqfnlq7npJ/SLvvB/VVvP9+Jvw4Ur2aQaae:TqfnlqbX/SLB/XtKVgQaa
Threatray 55 similar samples on MalwareBazaar
TLSH T18864239C21A451A9D94E3FF1C81B3338539FA85DE42EEA37F45C527716CC28CAEA4178
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 0080c068d45c1503 (1 x njrat)
Reporter BastianHein
Tags:exe NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
458
Origin country :
CL CL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RCE dll.exe
Verdict:
No threats detected
Analysis date:
2025-05-25 01:50:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
cobalt proxy
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a file
DNS request
Connection attempt
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Running batch commands
Launching a process
Creating a window
Connection attempt to an infection source
Connecting to a non-recommended domain
Searching for synchronization primitives
Setting browser functions hooks
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Launching the process to change the firewall settings
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected vbnet
Malware family:
ModernLoader
Verdict:
Malicious
Result
Threat name:
Njrat, XWorm
Detection:
malicious
Classification:
spre.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Creates a thread in another existing process (thread injection)
Disables zone checking for all users
Drops executables to the windows directory (C:\Windows) and starts them
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Njrat
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1698920 Sample: RCEdll.exe Startdate: 26/05/2025 Architecture: WINDOWS Score: 100 68 rentry.co 2->68 70 abol8b-27708.portmap.io 2->70 72 5 other IPs or domains 2->72 96 Suricata IDS alerts for network traffic 2->96 98 Found malware configuration 2->98 100 Malicious sample detected (through community Yara rule) 2->100 104 20 other signatures 2->104 9 WUDFHost.exe 2->9         started        14 RCEdll.exe 4 2->14         started        16 WUDFHost.exe 2->16         started        signatures3 102 Connects to a pastebin service (likely for C&C) 68->102 process4 dnsIp5 78 abol8b-27708.portmap.io 193.161.193.99, 1177, 27708, 49694 BITREE-ASRU Russian Federation 9->78 80 myapps.sytes.net 201.127.226.12, 56362 UninetSAdeCVMX Mexico 9->80 82 3 other IPs or domains 9->82 58 C:\Users\user\AppData\...\tmp6C11.tmp.exe, PE32 9->58 dropped 60 C:\Users\user\AppData\...\5xcjknnj.mhk.exe, PE32+ 9->60 dropped 108 Protects its processes via BreakOnTermination flag 9->108 110 Disables zone checking for all users 9->110 18 5xcjknnj.mhk.exe 9->18         started        21 netsh.exe 9->21         started        62 C:\Windows\...\Runtime Broker.exe, PE32 14->62 dropped 64 C:\Windows\Offline Web Pages\RCE dll.exe, PE32 14->64 dropped 66 C:\Users\user\AppData\...\RCEdll.exe.log, CSV 14->66 dropped 112 Drops executables to the windows directory (C:\Windows) and starts them 14->112 23 Runtime Broker.exe 14 7 14->23         started        27 RCE dll.exe 1 14->27         started        114 Antivirus detection for dropped file 16->114 116 Multi AV Scanner detection for dropped file 16->116 118 Uses netsh to modify the Windows network and firewall settings 16->118 120 Modifies the windows firewall 16->120 file6 signatures7 process8 dnsIp9 84 Antivirus detection for dropped file 18->84 86 Multi AV Scanner detection for dropped file 18->86 88 Injects code into the Windows Explorer (explorer.exe) 18->88 94 6 other signatures 18->94 29 winlogon.exe 18->29 injected 31 lsass.exe 18->31 injected 33 svchost.exe 18->33 injected 46 19 other processes 18->46 35 conhost.exe 21->35         started        74 ip-api.com 208.95.112.1, 49687, 80 TUT-ASUS United States 23->74 76 discord.com 162.159.128.233, 443, 49688 CLOUDFLARENETUS United States 23->76 56 C:\ProgramData\WUDFHost.exe, PE32 23->56 dropped 90 Adds a directory exclusion to Windows Defender 23->90 37 powershell.exe 23 23->37         started        40 powershell.exe 23 23->40         started        42 cmd.exe 23->42         started        92 Found direct / indirect Syscall (likely to bypass EDR) 27->92 44 conhost.exe 27->44         started        file10 signatures11 process12 signatures13 106 Loading BitLocker PowerShell Module 37->106 48 conhost.exe 37->48         started        50 conhost.exe 40->50         started        52 conhost.exe 42->52         started        54 timeout.exe 42->54         started        process14
Threat name:
ByteCode-MSIL.Trojan.XWormRAT
Status:
Malicious
First seen:
2025-05-25 01:55:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm defense_evasion execution persistence privilege_escalation rat trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
Drops file in Windows directory
Drops file in System32 directory
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Indicator Removal: Clear Windows Event Logs
Command and Scripting Interpreter: PowerShell
Modifies Windows Firewall
Detect Xworm Payload
Xworm
Xworm family
Verdict:
Malicious
Tags:
external_ip_lookup
YARA:
n/a
Unpacked files
SH256 hash:
372618e3d38fff25fcfbb51f9144b0c9493edf8de00684bf218b9d8b3d37dc25
MD5 hash:
8dae7017994a053309640bc727791b9a
SHA1 hash:
1cb0e3054bd3cae1a76b673f02c7429812bf7c5b
SH256 hash:
cae207cee08d6b586e1845ad008e17f5a0b4ce13e00e8e6919ff6bf7e0dd0cb9
MD5 hash:
7a2873e74ec9464c1d3516ee0ec4f3e8
SHA1 hash:
4c55b0d2b3d6d4f11c1ce8943e411aba2b9acffc
SH256 hash:
59d32fa381f4dd0d841042c158dc54448af26913ae97a1bc401dfd2dc4da6387
MD5 hash:
13a1aa43ddd69d5554d2dc5bebd432e0
SHA1 hash:
d0bc2333592b66b2e177c3ec02334c887b502e02
Detections:
INDICATOR_SUSPICIOUS_EXE_DiscordURL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MALWARE_Win_R77
Author:ditekSHen
Description:Detects r77 rootkit
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments