MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a045c1cc2b85a5106a89a970262a3ba07dc65d96573401f1f31b4f9867ba7130. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: a045c1cc2b85a5106a89a970262a3ba07dc65d96573401f1f31b4f9867ba7130
SHA3-384 hash: b2cef9e2f6b7578c3e2e7449565b4f84a26d65696fe54b0fc144edeb8b8eb861ffa1929148b7e79193e31540361350e9
SHA1 hash: 758dbd528a61ac56767fab89600c1656d20693bd
MD5 hash: 98d5dd6c09fa093e791e3c18a9526859
humanhash: whiskey-pasta-twenty-oklahoma
File name:98d5dd6c09fa093e791e3c18a9526859.exe
Download: download sample
Signature njrat
File size:315'325 bytes
First seen:2021-04-18 15:44:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 6144:8/fAhvV6B8ErzPZp5wdz753RSkKJUHa6UgeUCAsIQ:YfAv6B8azBwdtK2Ha7UoIQ
Threatray 503 similar samples on MalwareBazaar
TLSH F664BF02FAC284B2E5721A365939AB21697C7D301F24DA6FB3D40D6D9E311C1A635BB3
Reporter abuse_ch
Tags:exe NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
98d5dd6c09fa093e791e3c18a9526859.exe
Verdict:
Malicious activity
Analysis date:
2021-04-18 15:47:13 UTC
Tags:
rat njrat bladabindi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Creating a file
Sending a UDP request
Enabling the 'hidden' option for recently created files
DNS request
Creating a file in the %AppData% subdirectories
Connection attempt
Unauthorized injection to a recently created process
Creating a file in the mass storage device
Launching the process to change the firewall settings
Launching a tool to kill processes
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Launching a file downloaded from the Internet
Enabling threat expansion on mass storage devices by creating a special LNK file
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
njRat LimeRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Detected njRat
Disables the Windows task manager (taskmgr)
Drops batch files with force delete cmd (self deletion)
Drops PE files with a suspicious file extension
Drops PE files with benign system names
Drops VBS files to the startup folder
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Drops script at startup location
Sigma detected: Powershell download and execute file
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to download and execute files (via powershell)
Tries to resolve many domain names, but no domain seems valid
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Shell Script Host drops VBS files
Wscript starts Powershell (via cmd or directly)
Yara detected LimeRAT
Yara detected Njrat
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 391547 Sample: ZOjQt70Exw.exe Startdate: 18/04/2021 Architecture: WINDOWS Score: 100 105 rogdo0239.servehalflife.com 2->105 107 rinot972.serveirc.com 2->107 109 38 other IPs or domains 2->109 157 Found malware configuration 2->157 159 Malicious sample detected (through community Yara rule) 2->159 161 Antivirus detection for URL or domain 2->161 167 16 other signatures 2->167 15 ZOjQt70Exw.exe 3 34 2->15         started        19 svchost.exe 2->19         started        21 svchost.exe 1 2->21         started        23 svchost.exe 2->23         started        signatures3 163 Tries to resolve many domain names, but no domain seems valid 105->163 165 System process connects to network (likely due to code injection or exploit) 107->165 process4 file5 97 C:\Users\user\AppData\Local\...\svchost.exe, PE32 15->97 dropped 99 C:\Users\user\AppData\Local\...\csrss.exe, PE32 15->99 dropped 101 C:\Users\user\AppData\...\windowsapp.bat, ASCII 15->101 dropped 103 5 other malicious files 15->103 dropped 131 Drops batch files with force delete cmd (self deletion) 15->131 133 Drops PE files with benign system names 15->133 25 wscript.exe 1 15->25         started        135 Multi AV Scanner detection for dropped file 19->135 137 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 19->137 signatures6 process7 signatures8 181 System process connects to network (likely due to code injection or exploit) 25->181 183 Wscript starts Powershell (via cmd or directly) 25->183 185 Drops VBS files to the startup folder 25->185 187 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 25->187 28 cmd.exe 2 25->28         started        process9 signatures10 191 Suspicious powershell command line found 28->191 193 Wscript starts Powershell (via cmd or directly) 28->193 195 Uses ping.exe to sleep 28->195 197 3 other signatures 28->197 31 wscript.exe 1 28->31         started        34 WMIC.exe 1 28->34         started        36 PING.EXE 1 28->36         started        39 5 other processes 28->39 process11 dnsIp12 217 Wscript starts Powershell (via cmd or directly) 31->217 41 cmd.exe 2 31->41         started        219 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 34->219 111 127.0.0.1 unknown unknown 36->111 signatures13 process14 signatures15 189 Uses ping.exe to sleep 41->189 44 wscript.exe 41->44         started        47 wscript.exe 41->47         started        51 wscript.exe 41->51         started        53 7 other processes 41->53 process16 dnsIp17 199 Wscript starts Powershell (via cmd or directly) 44->199 55 cmd.exe 44->55         started        129 192.168.2.1 unknown unknown 47->129 83 C:\Users\user\AppData\Local\Temp\z.vbs, UTF-8 47->83 dropped 201 Windows Shell Script Host drops VBS files 47->201 203 Creates multiple autostart registry keys 47->203 58 wscript.exe 47->58         started        85 C:\Users\user\AppData\Local\Temp\helps.vbs, UTF-8 51->85 dropped 62 wscript.exe 51->62         started        205 Disables the Windows task manager (taskmgr) 53->205 file18 signatures19 process20 dnsIp21 169 Suspicious powershell command line found 55->169 171 Wscript starts Powershell (via cmd or directly) 55->171 173 Tries to download and execute files (via powershell) 55->173 64 svchost.exe 55->64         started        68 csrss.exe 55->68         started        70 powershell.exe 55->70         started        73 conhost.exe 55->73         started        115 rinot972.servehttp.com 58->115 117 rinot972.servegame.com 58->117 123 48 other IPs or domains 58->123 93 C:\Users\user\AppData\Roaming\...\z.vbs, UTF-8 58->93 dropped 175 System process connects to network (likely due to code injection or exploit) 58->175 119 marena9201.myftp.org 62->119 121 rogdo0239.freedynamicdns.org 62->121 125 65 other IPs or domains 62->125 95 C:\Users\user\AppData\Roaming\...\helps.vbs, UTF-8 62->95 dropped file22 177 Tries to resolve many domain names, but no domain seems valid 115->177 179 Uses dynamic DNS services 119->179 signatures23 process24 dnsIp25 87 C:\ProgramData\svchost.exe, PE32 64->87 dropped 139 Antivirus detection for dropped file 64->139 141 Multi AV Scanner detection for dropped file 64->141 143 Machine Learning detection for dropped file 64->143 75 svchost.exe 64->75         started        89 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 68->89 dropped 145 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 68->145 147 Uses schtasks.exe or at.exe to add and modify task schedules 68->147 149 Drops PE files with benign system names 68->149 151 Hides that the sample has been downloaded from the Internet (zone.identifier) 68->151 79 schtasks.exe 68->79         started        113 34.126.93.163, 49733, 49736, 80 GOOGLEUS United States 70->113 91 C:\Users\user\AppData\Local\Temp\...\win.com, PE32 70->91 dropped 153 Drops PE files with a suspicious file extension 70->153 155 Powershell drops PE file 70->155 file26 signatures27 process28 dnsIp29 127 niogem117.soon.it 75->127 207 Antivirus detection for dropped file 75->207 209 System process connects to network (likely due to code injection or exploit) 75->209 211 Multi AV Scanner detection for dropped file 75->211 215 3 other signatures 75->215 81 conhost.exe 79->81         started        signatures30 213 Tries to resolve many domain names, but no domain seems valid 127->213 process31
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:limerat family:njrat family:xmrig evasion miner persistence rat trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies registry class
Modifies registry key
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Drops startup file
Adds policy Run key to start application
Blocklisted process makes network request
Disables Task Manager via registry modification
Executes dropped EXE
Modifies Windows Firewall
XMRig Miner Payload
LimeRAT
njRAT/Bladabindi
xmrig
Malware Config
Dropper Extraction:
http://34.126.93.163/xm/win.com
http://34.126.93.163/xm/64a1.com
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

njrat

Executable exe a045c1cc2b85a5106a89a970262a3ba07dc65d96573401f1f31b4f9867ba7130

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-18 16:02:09 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [C0029.002] Cryptography Micro-objective::SHA1::Cryptographic Hash
2) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
3) [C0031.001] Cryptography Micro-objective::AES::Decrypt Data
4) [C0032.001] Data Micro-objective::CRC32::Checksum
5) [C0026.002] Data Micro-objective::XOR::Encode Data
6) [C0030.001] Data Micro-objective::MurmurHash::Non-Cryptographic Hash
7) [F0004.007] Defense Evasion::Bypass Windows File Protection
9) [C0046] File System Micro-objective::Create Directory
10) [C0048] File System Micro-objective::Delete Directory
11) [C0047] File System Micro-objective::Delete File
12) [C0049] File System Micro-objective::Get File Attributes
13) [C0051] File System Micro-objective::Read File
14) [C0050] File System Micro-objective::Set File Attributes
15) [C0052] File System Micro-objective::Writes File
16) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
17) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
18) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
19) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
20) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
21) [C0040] Process Micro-objective::Allocate Thread Local Storage
22) [C0017] Process Micro-objective::Create Process
23) [C0038] Process Micro-objective::Create Thread
24) [C0041] Process Micro-objective::Set Thread Local Storage Value
25) [C0018] Process Micro-objective::Terminate Process