MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9dcd9722bae8dd0260f641d522553454b3f7fbc8df49ebb989a9257f38f42cec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
njrat
Vendor detections: 6
| SHA256 hash: | 9dcd9722bae8dd0260f641d522553454b3f7fbc8df49ebb989a9257f38f42cec |
|---|---|
| SHA3-384 hash: | 523c4bda6d4759ccb922fc766b7221453ef187a96fa28e3eda470addd8d35091e6039c77c174528a2f67434bb5ae0a7e |
| SHA1 hash: | 572dcf32bf6f0cf0aa78df411372e2908f6f68d7 |
| MD5 hash: | 54eeb64b2b44f452052bf980ac0c7fba |
| humanhash: | item-beryllium-princess-lamp |
| File name: | 54eeb64b2b44f452052bf980ac0c7fba |
| Download: | download sample |
| Signature | njrat |
| File size: | 301'056 bytes |
| First seen: | 2020-11-17 11:44:18 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'747 x AgentTesla, 19'642 x Formbook, 12'245 x SnakeKeylogger) |
| ssdeep | 3072:h1lhVUeZHdlgDgLl70de4HM2YUexu0YgFlpB2aAhG3++lx9fcSG1aHVgpejui7CE:5H5lURdBHMlU8LFN2cfPEFe4MmfJYXf |
| Threatray | 100 similar samples on MalwareBazaar |
| TLSH | 4954E13262C2BE96E75A2EB1F17222881FB57D279A34DA0D7DDC00DD1176B49CB10E72 |
| Reporter | |
| Tags: | NjRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Launching a process
Creating a file
Creating a file in the %temp% directory
Creating a process from a recently created file
Forced shutdown of a system process
Unauthorized injection to a system process
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-11-11 12:10:40 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 90 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
cb951f1d2b5460456aad0d89cef1216d9be5e51784d11a92447d43e96177bd5e
MD5 hash:
8cd5d2014866f4ef60802ff1826998a6
SHA1 hash:
8ff75946905d0b117080cc5a07e6e0bbea4e9bbd
SH256 hash:
9dcd9722bae8dd0260f641d522553454b3f7fbc8df49ebb989a9257f38f42cec
MD5 hash:
54eeb64b2b44f452052bf980ac0c7fba
SHA1 hash:
572dcf32bf6f0cf0aa78df411372e2908f6f68d7
SH256 hash:
ec48170e9de44632227e5f3dbfc912bcc7510e6954c626446f9d7b36d78a0c41
MD5 hash:
d52bdb2c581465ad40f34455daf81573
SHA1 hash:
f64c82e23b772b9ceb41f8397c15963e6a728156
Detections:
win_njrat_w1
win_njrat_g1
Parent samples :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 hash:
ed8655be8a505ad52a9e18a99c7cfedb89431509bf14cafc2a16308a794a24f2
MD5 hash:
6b383b3d6cc77c46d73ae1dfe1deb4ca
SHA1 hash:
6239a5575b250a7aaa9288c9539dd13f21ec986a
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.