MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b365ef77b8b8ed330a2e48b081a20d9eb5b275b276306e5b51615cf10821fe0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0b365ef77b8b8ed330a2e48b081a20d9eb5b275b276306e5b51615cf10821fe0
SHA3-384 hash: fb9628e05cdfe9057bccc8270a21ae454067ae06e967d02734529b4e6a0943c351d0a249eca40ede325dee8add1afaf3
SHA1 hash: 6501bb3b51d17424ccdded511c9dc9e826d90fe3
MD5 hash: 2e788f08fad48009fb75dd4747a0caf7
humanhash: echo-black-johnny-berlin
File name:FEXD12009123.vbs
Download: download sample
Signature njrat
File size:1'602 bytes
First seen:2021-08-15 07:37:33 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:rEEPdqnWahNkJPpUI0I2rWGItUIZOIIIPITI3uFIJwIEIfILdgcjacdgcquU2b7v:3+gx2Ahn1wE+FIzhg3Nz
Threatray 1'229 similar samples on MalwareBazaar
TLSH T1DA317E04703319D3EA16D42231A731DDBD312708AAFB8B71145EEA42AA409BF5C5CAB7
Reporter abuse_ch
Tags:NjRAT RAT vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
284
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Creates an undocumented autostart registry key
Multi AV Scanner detection for submitted file
Sigma detected: CrackMapExec PowerShell Obfuscation
VBScript performs obfuscated calls to suspicious functions
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
Threat name:
Script-WScript.Trojan.Valyria
Status:
Malicious
First seen:
2021-08-15 01:57:45 UTC
AV detection:
5 of 47 (10.64%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat rat suricata
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Blocklisted process makes network request
Async RAT payload
AsyncRat
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
Malware Config
C2 Extraction:
103.147.184.73:7920
Dropper Extraction:
https://transfer.sh/1gzdXBV/g-bypass.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments