MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 59a162db57475d3e895bedf4703cb4cfa709692a83780969bca06f05969aacad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
njrat
Vendor detections: 8
| SHA256 hash: | 59a162db57475d3e895bedf4703cb4cfa709692a83780969bca06f05969aacad |
|---|---|
| SHA3-384 hash: | 4236dc6aed553c562d571c8638ea613519f610d25670bfffcc26a4004494d42cd3ca7a2a2a07da1ea307a928598e5d3c |
| SHA1 hash: | 7f5c93e507933e1d1a5c12f776eaf51c067fd39d |
| MD5 hash: | 380612e3c280b4e811c19e95274b1015 |
| humanhash: | delta-yankee-lamp-lithium |
| File name: | 59a162db57475d3e895bedf4703cb4cfa709692a83780969bca06f05969aacad |
| Download: | download sample |
| Signature | njrat |
| File size: | 1'178'120 bytes |
| First seen: | 2020-11-11 11:38:04 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:XfIdbgDWsNajKsE7YxzpJHVLrh8mHa37aWtDv395V:0bgtsi+HtrOYa371DvnV |
| Threatray | 1 similar samples on MalwareBazaar |
| TLSH | CB45BE4273D1C071FFAA96739B2AF61146BD6D790123C41F13A83DBAAD711B1263DA23 |
| Reporter | |
| Tags: | NjRAT |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). |
| Rule name: | CN_disclosed_20180208_c |
|---|---|
| Author: | Florian Roth |
| Description: | Detects malware from disclosed CN malware set |
| Reference: | https://twitter.com/cyberintproject/status/961714165550342146 |
| Rule name: | Njrat |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect njRAT in memory |
| Rule name: | Ping_Del_method_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | cmd ping IP nul del |
| Rule name: | win_njrat_w1 |
|---|---|
| Author: | Brian Wallace @botnet_hunter |
| Description: | Identify njRat |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.