MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 12


Intelligence 12 IOCs 4 YARA File information Comments

SHA256 hash: cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2
SHA3-384 hash: 62fc1512450190c451fe88062b97a0b1548b449b0e0328dd4c2a0c23b25d18e972b43c2ce9f50a4dc027c846ec9793cf
SHA1 hash: 055acee75181881b27e6c489b85efc530ed2a145
MD5 hash: 61522f3e0ff5ffcd3b70af0969ce67ff
humanhash: hot-romeo-early-july
File name:CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe
Download: download sample
Signature njrat
File size:408'502 bytes
First seen:2021-09-11 07:01:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 027ea80e8125c6dda271246922d4c3b0 (10 x njrat, 7 x DCRat, 5 x DarkComet)
ssdeep 6144:GsCwu+mWhJifvtNP/7YXSLB80PhU36hR3pAtGedY6Sp1wRs/dJKxuw07ir6A:7xmIJQvPkitTkWR3pIY6+N1dwOiWA
Threatray 1'662 similar samples on MalwareBazaar
TLSH T1A694D001F7D284B2E5722935593DE734A93CBD301E24CA6FA7D40D6FBA74091A621FA3
dhash icon 100030b2b2300010 (1 x njrat)
Reporter abuse_ch
Tags:exe NjRAT RAT


Avatar
abuse_ch
njrat C2:
3.134.125.175:18926

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
3.134.125.175:18926 https://threatfox.abuse.ch/ioc/220249/
3.134.39.220:18926 https://threatfox.abuse.ch/ioc/220250/
3.13.191.225:18926 https://threatfox.abuse.ch/ioc/220251/
3.22.30.40:18926 https://threatfox.abuse.ch/ioc/220252/

Intelligence


File Origin
# of uploads :
1
# of downloads :
509
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe
Verdict:
Malicious activity
Analysis date:
2021-09-11 07:03:01 UTC
Tags:
rat njrat bladabindi trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
DNS request
Connection attempt to an infection source
Creating a window
Searching for the window
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% directory
Launching the process to change the firewall settings
Firewall traversal
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Detected njRat
Drops PE files to the startup folder
Found malware configuration
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses dynamic DNS services
Uses netsh to modify the Windows network and firewall settings
Yara detected Njrat
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 481524 Sample: CF75D51EC31D817017D71DBE8DE... Startdate: 11/09/2021 Architecture: WINDOWS Score: 100 56 hacktrojancy.ddns.net 2->56 58 0.tcp.ngrok.io 2->58 70 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->70 72 Multi AV Scanner detection for domain / URL 2->72 74 Found malware configuration 2->74 76 14 other signatures 2->76 10 CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe 8 2->10         started        13 Chrome.exe 2->13         started        15 Trojan.exe 2->15         started        17 4 other processes 2->17 signatures3 process4 file5 46 C:\Users\user\Desktop\aaa.exe, PE32 10->46 dropped 48 C:\Users\user\Desktop48etFlix Creator.exe, PE32 10->48 dropped 50 C:\Users\user\Desktop\Lammer.exe, PE32 10->50 dropped 19 Lammer.exe 1 5 10->19         started        23 aaa.exe 5 10->23         started        25 NetFlix Creator.exe 2 10->25         started        process6 file7 42 C:\Users\user\AppData\Local\Temp\Chrome.exe, PE32 19->42 dropped 78 Antivirus detection for dropped file 19->78 80 Multi AV Scanner detection for dropped file 19->80 82 Machine Learning detection for dropped file 19->82 84 Infects executable files (exe, dll, sys, html) 19->84 27 Chrome.exe 4 5 19->27         started        44 C:\Users\user\AppData\Local\Temp\Trojan.exe, PE32 23->44 dropped 32 Trojan.exe 3 5 23->32         started        signatures8 process9 dnsIp10 60 hacktrojancy.ddns.net 27->60 62 192.168.2.1 unknown unknown 27->62 52 C:\...\d4edd1f042d4d9678bd0e6fffb41b44f.exe, PE32 27->52 dropped 86 Antivirus detection for dropped file 27->86 88 Multi AV Scanner detection for dropped file 27->88 90 Protects its processes via BreakOnTermination flag 27->90 98 3 other signatures 27->98 34 netsh.exe 27->34         started        64 3.134.39.220, 18926, 49746, 49750 AMAZON-02US United States 32->64 66 0.tcp.ngrok.io 3.14.182.203, 18926, 49737, 49740 AMAZON-02US United States 32->66 68 3.22.30.40, 18926, 49798, 49799 AMAZON-02US United States 32->68 54 C:\...\25cfdc389bb9a2acd67334f0453faa4c.exe, PE32 32->54 dropped 92 Machine Learning detection for dropped file 32->92 94 Creates autostart registry keys with suspicious names 32->94 96 Creates multiple autostart registry keys 32->96 36 netsh.exe 32->36         started        file11 signatures12 process13 process14 38 conhost.exe 34->38         started        40 conhost.exe 36->40         started       
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2018-07-16 18:32:05 UTC
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:njrat botnet:aaa botnet:lammer evasion persistence trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Drops startup file
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
njRAT/Bladabindi
Malware Config
C2 Extraction:
hacktrojancy.ddns.net:1177
0.tcp.ngrok.io:18926
Unpacked files
SH256 hash:
19f7deff05c3b6d7c076d9f76a5193123fa2e91e652f1310f76a0485198a9a66
MD5 hash:
805d4e2420bbc5d4aa9a803fbc55e740
SHA1 hash:
a95f2ec47d9ddc393ee31940373f80f978c26dd2
Detections:
win_njrat_w1 win_njrat_g1
SH256 hash:
6118291bbc41f6d0d82b5d753eab73e1cd3913adae4b99dc2c98cbf0c57ffc20
MD5 hash:
0654c1d389aeb6a0d6276af45e6a737c
SHA1 hash:
a44a59f61a739197890a6525fe702f157ae23a79
Detections:
win_njrat_w1 win_njrat_g1
SH256 hash:
9c7e183aca509ecb4e356ba93011bf806fc91b9942c66f6fed5c318e843a5eab
MD5 hash:
622f37b69d59cfdc990de3e711ab83a9
SHA1 hash:
12ac5f23fd534723ba23f9dd98d5ed540b82c3c9
SH256 hash:
cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2
MD5 hash:
61522f3e0ff5ffcd3b70af0969ce67ff
SHA1 hash:
055acee75181881b27e6c489b85efc530ed2a145
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments