MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2432f01cd92be89d208d067815c2bd8c04c11736a3ab8fb8dbc464d1a0930a58. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 2432f01cd92be89d208d067815c2bd8c04c11736a3ab8fb8dbc464d1a0930a58
SHA3-384 hash: aa484369393a7e4612981c409da3ea8c22ce4596311d0bcef90b913ae7d51db30190821018467098ecde6df4d72430aa
SHA1 hash: 7b94738a3e8a7f25493d2164d31fb684d3c6f3f9
MD5 hash: ffebab4dddc002fdc2223e44dc21543a
humanhash: louisiana-double-tennessee-snake
File name:2432f01cd92be89d208d067815c2bd8c04c11736a3ab8fb8dbc464d1a0930a58
Download: download sample
Signature njrat
File size:3'330'560 bytes
First seen:2021-02-28 07:12:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 98304:Aviz/27qWGq/TzuqCDl2Ptao7jN4rQNq:Aviq75/TzufwTNq
Threatray 584 similar samples on MalwareBazaar
TLSH 56F533017ACC403BC4B2037064FD93871BB9BC7256F9970AA0C9514E1DA64A5AAFBFF5
Reporter JAMESWT_WT
Tags:NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2432f01cd92be89d208d067815c2bd8c04c11736a3ab8fb8dbc464d1a0930a58
Verdict:
Malicious activity
Analysis date:
2021-02-28 07:46:21 UTC
Tags:
rat njrat bladabindi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Sending a UDP request
Creating a window
Delayed reading of the file
Creating a file
Creating a process with a hidden window
Searching for the window
DNS request
Connection attempt
Deleting a recently created file
Unauthorized injection to a recently created process
Launching the process to change the firewall settings
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Binary contains a suspicious time stamp
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Detected njRat
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Uses netsh to modify the Windows network and firewall settings
Yara detected Njrat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 359525 Sample: 8Bv82XkPtY Startdate: 28/02/2021 Architecture: WINDOWS Score: 100 49 Malicious sample detected (through community Yara rule) 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Detected njRat 2->53 55 8 other signatures 2->55 10 8Bv82XkPtY.exe 1 13 2->10         started        13 server.exe 3 2->13         started        15 server.exe 2 2->15         started        17 2 other processes 2->17 process3 file4 39 C:\Users\user\AppData\Local\Temp\...\CDS.exe, PE32 10->39 dropped 41 C:\Users\user\AppData\Local\...\lua51.dll, PE32 10->41 dropped 43 C:\Users\user\AppData\Local\...\lua5.1.dll, PE32 10->43 dropped 19 CDS.exe 3 10->19         started        process5 dnsIp6 45 192.168.2.1 unknown unknown 19->45 35 C:\Users\user\AppData\Local\...\crypted.exe, PE32 19->35 dropped 23 crypted.exe 1 5 19->23         started        file7 process8 file9 37 C:\Users\user\AppData\Local\Temp\server.exe, PE32 23->37 dropped 57 Antivirus detection for dropped file 23->57 59 Machine Learning detection for dropped file 23->59 27 server.exe 4 4 23->27         started        signatures10 process11 dnsIp12 47 sanyor77.ddns.net 31.167.102.76, 5552 MOBILY-ASEtihadEtisalatCompanyMobilySA Saudi Arabia 27->47 61 Antivirus detection for dropped file 27->61 63 Multi AV Scanner detection for dropped file 27->63 65 Machine Learning detection for dropped file 27->65 67 Creates autostart registry keys with suspicious names 27->67 31 netsh.exe 1 3 27->31         started        signatures13 process14 process15 33 conhost.exe 31->33         started       
Threat name:
Win32.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2021-02-26 14:11:30 UTC
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:njrat evasion persistence trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
njRAT/Bladabindi
Unpacked files
SH256 hash:
c100c961a18f81524111abfb500d3be75226fc096856ac9347c24eae420269cb
MD5 hash:
ae2eb55ca7f267ecde57e943580e2aab
SHA1 hash:
e7c8dc23dbcb5a9d1b4c2c9a389ecb2e90910c7f
Detections:
win_njrat_w1 win_njrat_g1
SH256 hash:
ef152f5ab4c91464f2775454c10b56f2ac492dbd7a2a1e36e72286841526db0b
MD5 hash:
54bd6e30dbf4e744ba308387c77914ef
SHA1 hash:
82cb35e8b2ee1de6135569137f53dcfecfdbc984
SH256 hash:
122b7f0d8864f4c56d8450b7e53268a56271eef3ad51771f71b64572ed58a9e9
MD5 hash:
580bb021ca4da4905f3715609b4e99ff
SHA1 hash:
77ff9542ca0c90543fd527c95e290145a445de3c
SH256 hash:
2432f01cd92be89d208d067815c2bd8c04c11736a3ab8fb8dbc464d1a0930a58
MD5 hash:
ffebab4dddc002fdc2223e44dc21543a
SHA1 hash:
7b94738a3e8a7f25493d2164d31fb684d3c6f3f9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments