MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03a424fc93d692901bc1ca02b532934101c5448d093c9b0d74fa927f14304bd3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 03a424fc93d692901bc1ca02b532934101c5448d093c9b0d74fa927f14304bd3
SHA3-384 hash: d53242dfdf29f62024f822c8188917867fbb02dc9182b0725ca52599e192b3e083667a2d42eb669835791a6a53b823f7
SHA1 hash: e266e0608582ad6ced723d24a99f596d04a397cb
MD5 hash: 0caac68967a740763027d0f848386f7b
humanhash: east-five-pennsylvania-three
File name:03a424fc93d692901bc1ca02b532934101c5448d093c9b0d74fa927f14304bd3
Download: download sample
Signature njrat
File size:1'059'328 bytes
First seen:2020-06-17 09:03:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:icbfCBQokSW0j7VDI+3C2H6qUqYeYY1jLMex5pvQSWqFacj54sN:icbWQokS/i+3RxUqZYY1LMeRbWqx4s
Threatray 146 similar samples on MalwareBazaar
TLSH 6C35125AB68EBE06E26E063258F1D2250CF2BE3F1541C57674A437796B776CCCC0268E
Reporter JAMESWT_WT
Tags:NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2015-11-16 00:44:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
evasion persistence trojan family:njrat
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Modifies service
Drops startup file
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
njRAT/Bladabindi
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments