MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 15


Intelligence 15 IOCs YARA 22 File information Comments

SHA256 hash: 6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9
SHA3-384 hash: 03c9c9270afa493b28c315dba932f1455f330b1c0297a5e402883ad2984c118f1b7758ee710fb9bffd64ec67298b8d5d
SHA1 hash: b27e29d090712a2cf50d17a17fb1a8f78fba8aec
MD5 hash: d83d5ff23292103a65b43fbd42b7f243
humanhash: princess-jupiter-nuts-failed
File name:Everythin.exe
Download: download sample
Signature njrat
File size:30'945'123 bytes
First seen:2025-02-08 20:02:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b1c5b1beabd90d9fdabd1df0779ea832 (11 x CoinMiner, 10 x QuasarRAT, 8 x AsyncRAT)
ssdeep 786432:a97LDzYHKsqAK/DxlMwVbrxpstnsnxzxP3LLv:o7LfgOh/TMQ3OnMxtPv
TLSH T13767334DD5CD09A9FDE9C378ED171A2BFBB3BC41529195CFA22102321DA39548F293E2
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
File icon (PE):PE icon
dhash icon 18f0787078c0c018 (2 x njrat)
Reporter aachum
Tags:exe NjRAT


Avatar
iamaachum
https://wdfiles.ru/3vHuw

njRAT C2: environmental-seeds.gl.at.ply.gg:35534

Intelligence


File Origin
# of uploads :
1
# of downloads :
534
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Everythin.exe
Verdict:
Malicious activity
Analysis date:
2025-02-08 20:07:26 UTC
Tags:
python njrat pyinstaller

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
bladabindi asyncrat autorun njrat
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a process with a hidden window
Running batch commands
Creating a file in the %AppData% directory
Launching a process
Using the Windows Management Instrumentation requests
Moving a recently created file
Enabling the 'hidden' option for recently created files
Connection attempt to an infection source
Unauthorized injection to a recently created process
Launching a tool to kill processes
Creating a file in the mass storage device
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Result
Threat name:
Blank Grabber, Njrat
Detection:
malicious
Classification:
rans.phis.troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Disables zone checking for all users
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Capture Wi-Fi password
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes many files with high entropy
Yara detected Blank Grabber
Yara detected Njrat
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1610239 Sample: Everythin.exe Startdate: 08/02/2025 Architecture: WINDOWS Score: 100 167 api.telegram.org 2->167 169 children-timing.gl.at.ply.gg 2->169 171 ip-api.com 2->171 187 Suricata IDS alerts for network traffic 2->187 189 Found malware configuration 2->189 191 Malicious sample detected (through community Yara rule) 2->191 195 14 other signatures 2->195 15 Everythin.exe 8 2->15         started        signatures3 193 Uses the Telegram API (likely for C&C communication) 167->193 process4 file5 161 C:\Users\user\Desktop\main.exe, PE32+ 15->161 dropped 163 C:\Users\user\Desktopverythingnew.exe, PE32 15->163 dropped 165 C:\Users\user\Desktopverything.exe, PE32 15->165 dropped 179 Writes many files with high entropy 15->179 19 main.exe 13 15->19         started        23 Everything.exe 7 15->23         started        25 Everythingnew.exe 1 15->25         started        signatures6 process7 file8 119 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 19->119 dropped 121 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 19->121 dropped 123 C:\Users\user\AppData\Local\...\python313.dll, PE32+ 19->123 dropped 131 8 other malicious files 19->131 dropped 197 Writes many files with high entropy 19->197 199 Found pyInstaller with non standard icon 19->199 27 main.exe 19->27         started        125 C:\windows.exe, PE32 23->125 dropped 127 C:\Users\user\AppData\Local\...\80334 (copy), PE32 23->127 dropped 129 C:\ProgramData\windows.exe, PE32 23->129 dropped 201 Antivirus detection for dropped file 23->201 203 Machine Learning detection for dropped file 23->203 205 Drops executables to the windows directory (C:\Windows) and starts them 23->205 207 Uses schtasks.exe or at.exe to add and modify task schedules 23->207 29 windows.exe 23->29         started        34 cmd.exe 23->34         started        36 taskkill.exe 1 23->36         started        38 2 other processes 23->38 signatures9 process10 dnsIp11 40 cmd.exe 1 27->40         started        177 children-timing.gl.at.ply.gg 147.185.221.25, 10454, 49740, 50013 SALSGIVERUS United States 29->177 153 C:\Users\user\AppData\Roaming\...\windows.exe, PE32 29->153 dropped 155 C:\Users\user\AppData\Local\...\75721 (copy), PE32 29->155 dropped 157 C:\Users\user\AppData\Local\...\48150 (copy), PE32 29->157 dropped 159 2 other malicious files 29->159 dropped 251 Antivirus detection for dropped file 29->251 253 Multi AV Scanner detection for dropped file 29->253 255 Protects its processes via BreakOnTermination flag 29->255 257 4 other signatures 29->257 43 taskkill.exe 29->43         started        45 taskkill.exe 29->45         started        47 schtasks.exe 29->47         started        49 conhost.exe 34->49         started        51 choice.exe 34->51         started        53 conhost.exe 36->53         started        55 conhost.exe 38->55         started        57 conhost.exe 38->57         started        file12 signatures13 process14 signatures15 217 Uses netsh to modify the Windows network and firewall settings 40->217 219 Modifies Windows Defender protection settings 40->219 221 Adds a directory exclusion to Windows Defender 40->221 223 Tries to harvest and steal WLAN passwords 40->223 59 Build.exe 6 40->59         started        63 powershell.exe 40->63         started        65 conhost.exe 40->65         started        67 conhost.exe 40->67         started        69 conhost.exe 43->69         started        71 conhost.exe 45->71         started        73 conhost.exe 47->73         started        process16 file17 133 C:\ProgramData\Microsoft\hacn.exe, PE32+ 59->133 dropped 135 C:\ProgramData\Microsoft\based.exe, PE32+ 59->135 dropped 231 Multi AV Scanner detection for dropped file 59->231 233 Writes many files with high entropy 59->233 75 hacn.exe 13 59->75         started        79 based.exe 59->79         started        235 Loading BitLocker PowerShell Module 63->235 signatures18 process19 file20 137 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 75->137 dropped 139 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 75->139 dropped 141 C:\Users\user\AppData\Local\...\python310.dll, PE32+ 75->141 dropped 149 8 other malicious files 75->149 dropped 237 Multi AV Scanner detection for dropped file 75->237 239 Writes many files with high entropy 75->239 241 Found pyInstaller with non standard icon 75->241 81 hacn.exe 75->81         started        143 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 79->143 dropped 145 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 79->145 dropped 147 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 79->147 dropped 151 16 other malicious files 79->151 dropped 243 Modifies Windows Defender protection settings 79->243 245 Adds a directory exclusion to Windows Defender 79->245 247 Tries to harvest and steal WLAN passwords 79->247 249 Removes signatures from Windows Defender 79->249 83 based.exe 79->83         started        signatures21 process22 dnsIp23 87 cmd.exe 81->87         started        173 ip-api.com 208.95.112.1, 49746, 80 TUT-ASUS United States 83->173 175 api.telegram.org 149.154.167.220, 443, 49752, 49758 TELEGRAMRU United Kingdom 83->175 209 Found many strings related to Crypto-Wallets (likely being stolen) 83->209 211 Tries to harvest and steal browser information (history, passwords, etc) 83->211 213 Modifies Windows Defender protection settings 83->213 215 4 other signatures 83->215 89 cmd.exe 83->89         started        92 cmd.exe 83->92         started        94 cmd.exe 83->94         started        96 10 other processes 83->96 signatures24 process25 signatures26 98 Build.exe 87->98         started        101 conhost.exe 87->101         started        225 Modifies Windows Defender protection settings 89->225 103 powershell.exe 89->103         started        105 conhost.exe 89->105         started        227 Adds a directory exclusion to Windows Defender 92->227 107 powershell.exe 92->107         started        109 conhost.exe 92->109         started        229 Tries to harvest and steal WLAN passwords 94->229 113 2 other processes 94->113 111 systeminfo.exe 96->111         started        115 16 other processes 96->115 process27 signatures28 181 Multi AV Scanner detection for dropped file 98->181 117 hacn.exe 98->117         started        183 Loading BitLocker PowerShell Module 103->183 185 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 111->185 process29
Gathering data
Threat name:
ByteCode-MSIL.Backdoor.njRAT
Status:
Malicious
First seen:
2025-02-08 20:02:27 UTC
File Type:
PE+ (Exe)
Extracted files:
1731
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:njrat botnet:stealer botnet:windows discovery persistence pyinstaller trojan upx
Behaviour
Kills process with taskkill
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
UPX packed file
Adds Run key to start application
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
Njrat family
njRAT/Bladabindi
Malware Config
C2 Extraction:
environmental-seeds.gl.at.ply.gg:35534
127.0.0.1:10454
Verdict:
Malicious
Tags:
Win.Packed.Bladabindi-10017056-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Emotet
Author:kevoreilly
Description:Emotet Payload
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:upx_largefile
Author:k3nr9
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

njrat

Executable exe 6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments