NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

MalwareBazaar Database

This page shows some basic information the YARA rule js_ratdispenser including corresponding malware samples.

Database Entry


YARA Rule:js_ratdispenser
Author:HP Threat Research @HPSecurity
Description:JavaScript downloader resp. dropper delivering various RATs
Firstseen:2021-06-05 06:22:18 UTC
Lastseen:2024-10-20 19:36:55 UTC
Sightings:138

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter