MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13f297d03a1dea9495fbd57508fdf3bc1975954ed97338bb4d35adcd9e02536d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 13f297d03a1dea9495fbd57508fdf3bc1975954ed97338bb4d35adcd9e02536d
SHA3-384 hash: ce18ab977bab49255fd19af8e058a18b42158b50796fca0897902106054928f3e46020846f464490c6f51579f8a89af1
SHA1 hash: 18f8d6499158fd1e6d976d7ddbb3a19c9ff021ea
MD5 hash: 404eadbb772fa9e1bb8c1d70710ceddb
humanhash: zulu-lactose-north-robert
File name:Invoice #20291.vbs
Download: download sample
Signature njrat
File size:1'136 bytes
First seen:2021-07-29 17:39:03 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:APQ1B03WktAzeArpIqmnAMvAN5STD69P1EI3SDKV:gWz5rK/AN5SPc1EI3D
Threatray 73 similar samples on MalwareBazaar
TLSH T1CC2100243A0FF1354549E2C65DFA9A24F7AB62ABC5641885323CC188507B4EE29C3FCE
Reporter abuse_ch
Tags:aggah hagga NjRAT RAT vbs


Avatar
abuse_ch
Payload URLs:
https://ia801407.us.archive.org/5/items/b_andre/b_andre.txt
https://ia601503.us.archive.org/7/items/andre_202107/andre.txt

Intelligence


File Origin
# of uploads :
1
# of downloads :
248
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Creates an undocumented autostart registry key
Obfuscated command line found
Sigma detected: Suspicious PowerShell Command Line
VBScript performs obfuscated calls to suspicious functions
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
Threat name:
Script.Downloader.Heuristic
Status:
Malicious
First seen:
2021-07-29 17:40:06 UTC
AV detection:
3 of 46 (6.52%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
suricata
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Blocklisted process makes network request
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
Malware Config
Dropper Extraction:
https://ia801407.us.archive.org/5/items/b_andre/b_andre.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments