MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6665a09f016607c1fb50c2680a0a6d16b6c4f7c761a3fcd326126b6b7a582f29. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 20


Intelligence 20 IOCs 2 YARA 55 File information Comments

SHA256 hash: 6665a09f016607c1fb50c2680a0a6d16b6c4f7c761a3fcd326126b6b7a582f29
SHA3-384 hash: 65b5ec267d40cbde2385371e12f045453e1599e4ecd85010fa65d4ec97a43b9d184f17e6c64d09a4d49271200ce1b5a5
SHA1 hash: 3c55749daf93c8fd1c0d4a553a410d0f469e3a96
MD5 hash: da21e710f576cd7175a6190bce08f95d
humanhash: nitrogen-lion-pip-bacon
File name:DA21E710F576CD7175A6190BCE08F95D.exe
Download: download sample
Signature njrat
File size:8'790'137 bytes
First seen:2025-10-05 22:45:08 UTC
Last seen:2025-10-06 08:10:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 196608:jtQ2KKRkb+gKVAECO4GZM7b2qiTzRUxgVkdMOwEjM9jpP+KM7/b:O2rk+ggAEp/CbQKxgcM5UCja7j
TLSH T1C7963361F5E1C1F6D12339B5CC04B6F2A5DAAE04DD380C8F6FA5BD54783620A44B2E9E
TrID 94.7% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
2.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.4% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
0.6% (.EXE) Win32 Executable (generic) (4504/4/1)
0.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter abuse_ch
Tags:exe NjRAT RAT


Avatar
abuse_ch
njrat C2:
178.162.203.202:1124

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
178.162.203.202:1124 https://threatfox.abuse.ch/ioc/1607900/
5.79.71.225:1124 https://threatfox.abuse.ch/ioc/1607901/

Intelligence


File Origin
# of uploads :
2
# of downloads :
214
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
DA21E710F576CD7175A6190BCE08F95D.exe
Verdict:
Malicious activity
Analysis date:
2025-10-05 22:46:20 UTC
Tags:
auto-reg dcrat rat adobeinstaller installer njrat bladabindi remote backdoor asyncrat quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
bladabindi vmdetect delphi njrat
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a file in the %AppData% directory
Creating a file
Creating a file in the Program Files subdirectories
Searching for synchronization primitives
Creating a process from a recently created file
Launching a process
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching the process to change the firewall settings
Query of malicious DNS domain
Connection attempt to an infection source
Sending a TCP request to an infection source
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug borland_delphi fingerprint installer overlay overlay packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2024-06-01T00:16:00Z UTC
Last seen:
2025-10-01T05:45:00Z UTC
Hits:
~100
Malware family:
Rhadamanthys
Verdict:
Malicious
Result
Threat name:
AsyncRAT, Dacic, DcRat, Njrat, Quasar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates multiple autostart registry keys
Drops PE files to the user root directory
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected Dacic
Yara detected DcRat
Yara detected Njrat
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1789431 Sample: tcTKrGXJFx.exe Startdate: 06/10/2025 Architecture: WINDOWS Score: 100 72 4mekey.myftp.biz 2->72 74 4Mekey.myftp.biz 2->74 76 bg.microsoft.map.fastly.net 2->76 80 Suricata IDS alerts for network traffic 2->80 82 Found malware configuration 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 13 other signatures 2->86 10 tcTKrGXJFx.exe 14 13 2->10         started        13 IwUp238.exe 2->13         started        16 Ijr314.exe 2->16         started        18 4 other processes 2->18 signatures3 process4 file5 64 C:\Users\user\AppData\Roaming\IwUp238.exe, PE32+ 10->64 dropped 66 C:\Users\user\AppData\Roaming\Id990.exe, PE32+ 10->66 dropped 68 C:\Users\user\AppData\Local\Temp\Ijr314.exe, PE32+ 10->68 dropped 70 2 other files (none is malicious) 10->70 dropped 20 Ijr314.exe 1 2 10->20         started        24 Id990.exe 1 2 10->24         started        26 IwUp238.exe 1 2 10->26         started        28 Set-up.exe 1 15 10->28         started        112 Multi AV Scanner detection for dropped file 13->112 114 Writes to foreign memory regions 13->114 116 Allocates memory in foreign processes 13->116 30 conhost.exe 13->30         started        32 RegAsm.exe 13->32         started        118 Sample uses process hollowing technique 16->118 120 Injects a PE file into a foreign processes 16->120 34 conhost.exe 16->34         started        36 jsc.exe 16->36         started        38 8 other processes 18->38 signatures6 process7 file8 58 C:\Users\user\Ijr314.exe, PE32+ 20->58 dropped 88 Multi AV Scanner detection for dropped file 20->88 90 Creates multiple autostart registry keys 20->90 92 Drops PE files to the user root directory 20->92 94 Injects a PE file into a foreign processes 20->94 40 jsc.exe 1 2 20->40         started        44 conhost.exe 20->44         started        60 C:\Users\user\Id990.exe, PE32+ 24->60 dropped 96 Writes to foreign memory regions 24->96 98 Allocates memory in foreign processes 24->98 100 Sample uses process hollowing technique 24->100 46 InstallUtil.exe 4 24->46         started        48 conhost.exe 24->48         started        62 C:\Users\user\IwUp238.exe, PE32+ 26->62 dropped 102 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 26->102 50 conhost.exe 26->50         started        52 RegAsm.exe 26->52         started        signatures9 process10 dnsIp11 78 4Mekey.myftp.biz 5.79.71.205, 1124, 4782, 49721 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 40->78 104 Uses netsh to modify the Windows network and firewall settings 40->104 106 Modifies the windows firewall 40->106 54 netsh.exe 2 40->54         started        108 Hides that the sample has been downloaded from the Internet (zone.identifier) 46->108 110 Installs a global keyboard hook 46->110 signatures12 process13 process14 56 conhost.exe 54->56         started       
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
CAB:COMPRESSION:NONE Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2025-10-01 09:27:10 UTC
File Type:
PE (Exe)
AV detection:
23 of 36 (63.89%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
quasarrat dcrat njrat
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:njrat family:quasar botnet:05kan24 adware defense_evasion discovery persistence privilege_escalation rat spyware trojan
Behaviour
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Modifies Windows Firewall
AsyncRat
Asyncrat family
Njrat family
Quasar RAT
Quasar family
Quasar payload
njRAT/Bladabindi
Malware Config
C2 Extraction:
4Mekey.myftp.biz:8848
4mekey.myftp.biz:1124
4Mekey.myftp.biz:4782
Verdict:
Malicious
Tags:
Win.Dropper.Nanocore-9189507-1 Bladabindi njrat
YARA:
n/a
Unpacked files
SH256 hash:
6665a09f016607c1fb50c2680a0a6d16b6c4f7c761a3fcd326126b6b7a582f29
MD5 hash:
da21e710f576cd7175a6190bce08f95d
SHA1 hash:
3c55749daf93c8fd1c0d4a553a410d0f469e3a96
SH256 hash:
e356f47fa091b8ad6c6f424ff49cd173abcc69f9df086a3254347ab907b607d6
MD5 hash:
df5446bfc0217da3ea20295429e4413e
SHA1 hash:
63372841acb052ac69ca1a66406f0697f3327522
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AcRat
Author:Nikos 'n0t' Totosis
Description:AcRat Payload (based on AsyncRat)
Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:ByteCode_MSIL_Backdoor_NjRAT
Author:ReversingLabs
Description:Yara rule that detects NjRAT backdoor.
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:dcrat
Author:jeFF0Falltrades
Rule name:dcrat_kingrat
Author:jeFF0Falltrades
Rule name:dcrat_rkp
Author:jeFF0Falltrades
Description:Detects DCRat payloads
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_B64_Artifacts
Author:ditekSHen
Description:Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
Rule name:INDICATOR_SUSPICIOUS_EXE_DcRatBy
Author:ditekSHen
Description:Detects executables containing the string DcRatBy
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice
Author:ditekSHen
Description:Detects executables attemping to enumerate video devices using WMI
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifacts observed in infostealers
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:MALWARE_Win_NjRAT
Author:ditekSHen
Description:Detects NjRAT / Bladabindi / NjRAT Golden
Rule name:MALWARE_Win_QuasarStealer
Author:ditekshen
Description:Detects Quasar infostealer
Rule name:MAL_AsnycRAT
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_AsyncRAT_Config_Decryption
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_QuasarRAT_May19_1
Description:Detects QuasarRAT malware
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:Mal_WIN_AsyncRat_RAT_PE
Author:Phatcharadol Thangplub
Description:Use to detect AsyncRAT implant.
Rule name:Mal_WIN_NjRAT_RAT_PE
Author:Phatcharadol Thangplub
Description:Use to detect NjRAT implant.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:quasarrat
Author:jeFF0Falltrades
Rule name:quasarrat_kingrat
Author:jeFF0Falltrades
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RC6_Constants
Author:chort (@chort0)
Description:Look for RC6 magic constants in binary
Reference:https://twitter.com/mikko/status/417620511397400576
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:SUSP_netsh_firewall_command
Author:SECUINFRA Falcon Team
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Windows_Generic_Threat_803feff4
Author:Elastic Security
Rule name:Windows_Generic_Threat_ce98c4bc
Author:Elastic Security
Rule name:Windows_Trojan_DCRat_1aeea1ac
Author:Elastic Security
Rule name:Windows_Trojan_Njrat_30f3c220
Rule name:win_asyncrat_unobfuscated
Author:Matthew @ Embee_Research
Description:Detects strings present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc)
Rule name:win_njrat_w1
Author:Brian Wallace @botnet_hunter <bwall@ballastsecurity.net>
Description:Identify njRat
Rule name:win_quasar_rat_client
Author:Matthew @ Embee_Research
Description:Detects strings present in Quasar Rat Samples.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments