MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 11


Intelligence 11 IOCs YARA 13 File information Comments

SHA256 hash: 286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9
SHA3-384 hash: 7e119e55cdf58b2e86c50533fbddc8316972a162db159c5aaa709b81460f2e66fb75bfe43ab9421209603129b52a74cf
SHA1 hash: 14abd6a4ba706dab1c35e9c9d8c0c1ec374b213e
MD5 hash: ad7c5d172b6fe743db4585f420a4265c
humanhash: fourteen-minnesota-mars-butter
File name:1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded
Download: download sample
Signature njrat
File size:181'524 bytes
First seen:2024-10-15 22:04:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 3072:3OFoA4JJET+MuXxbCBBONUG1m2+7i0icmFqYFE:3wVQguXxbkG1mq0ipK
TLSH T1BD044D176A90502ED86E8DF224B0D6197A729E270F909C1B63AEBB102E7714377F135F
TrID 42.6% (.EXE) Win32 Executable (generic) (4504/4/1)
19.4% (.ICL) Windows Icons Library (generic) (2059/9)
18.9% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:base64-decoded exe NjRAT


Avatar
abuse_ch
Malware dropped as base64 encoded payload

Intelligence


File Origin
# of uploads :
1
# of downloads :
465
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
Dropper Njrat Micro
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd explorer fingerprint lolbin netsh njrat rat shell32 stealer
Result
Verdict:
MALICIOUS
Result
Threat name:
Mofksys, Njrat
Detection:
malicious
Classification:
spre.troj
Score:
64 / 100
Signature
Malicious sample detected (through community Yara rule)
Yara detected Mofksys
Yara detected Njrat
Behaviour
Behavior Graph:
Threat name:
DOS.Packed.Dacic
Status:
Malicious
First seen:
2024-10-15 22:05:16 UTC
File Type:
MZ (DOS)
Extracted files:
2
AV detection:
4 of 38 (10.53%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Verdict:
Malicious
Tags:
trojan rat njrat
YARA:
Windows_Generic_Threat_7526f106 Windows_Trojan_Njrat_30f3c220 MALWARE_Win_NjRAT
Unpacked files
SH256 hash:
b963ec080651473a6c805fccb0e8a85b3dfc28db6ae46b161a658a360f1277ee
MD5 hash:
661c8e2db5d0f09b47d586204b525e4e
SHA1 hash:
09bf58b8d70d382fe1ff8035ad747827290c7005
Detections:
NjRat win_njrat_w1 win_njrat_g1 MALWARE_Win_NjRAT
SH256 hash:
286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9
MD5 hash:
ad7c5d172b6fe743db4585f420a4265c
SHA1 hash:
14abd6a4ba706dab1c35e9c9d8c0c1ec374b213e
Detections:
NjRat win_njrat_w1 win_njrat_g1 MALWARE_Win_NjRAT
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:MALWARE_Win_NjRAT
Author:ditekSHen
Description:Detects NjRAT / Bladabindi / NjRAT Golden
Rule name:Mal_WIN_NjRAT_RAT_PE
Author:Phatcharadol Thangplub
Description:Use to detect NjRAT implant.
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Generic_Threat_7526f106
Author:Elastic Security
Rule name:Windows_Trojan_Njrat_30f3c220
Rule name:Windows_Trojan_Njrat_30f3c220
Author:Elastic Security
Rule name:win_njrat_w1
Author:Brian Wallace @botnet_hunter <bwall@ballastsecurity.net>
Description:Identify njRat

File information


The table below shows additional information about this malware sample such as delivery method and external references.

909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14

njrat

Executable exe 286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9

(this sample)

  
Dropped by
SHA256 909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14
  
Dropped by
MD5 316e7895171f1928d15c73a45c38e19a
  
Delivery method
Distributed via web download

Comments