MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7deeabed9261564ba79c04d3909539ec31bada0b1c4e16755d759f742fb9818. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 18


Intelligence 18 IOCs YARA 26 File information Comments

SHA256 hash: a7deeabed9261564ba79c04d3909539ec31bada0b1c4e16755d759f742fb9818
SHA3-384 hash: f17a94a212b77fde787d4b646b47258320dcdc553fa08d7c2180c9f589eefb59a92900be994dd9e5adfba6fcdd6042d0
SHA1 hash: c81181e483cdfc5fc552f22b3dcfa0cd2782cf34
MD5 hash: 3339f240ffeb755b2f4874cbd4d0bbf7
humanhash: oklahoma-princess-chicken-beryllium
File name:3339f240ffeb755b2f4874cbd4d0bbf7.exe
Download: download sample
Signature njrat
File size:12'207'616 bytes
First seen:2025-03-17 03:10:11 UTC
Last seen:2025-03-17 03:15:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'752 x AgentTesla, 19'657 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 196608:krNm6AcQaUw3990H1+njZeHWpHGpvF6NIbxqZuROk1CbtQvEp4Q28Q:kheCIwnOWMpvsiQURXUBQvk4Q2j
TLSH T11FC633C8EBF2419AD4AA7DB3D5C269710B40DD91CFBC8854E1082B9917B4C358D6F8BE
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe NjRAT RAT


Avatar
abuse_ch
njrat C2:
147.185.221.26:55648

Intelligence


File Origin
# of uploads :
2
# of downloads :
573
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
3339f240ffeb755b2f4874cbd4d0bbf7.exe
Verdict:
Malicious activity
Analysis date:
2025-03-17 03:12:41 UTC
Tags:
python autorun-startup stealer exela evasion discord screenshot rat njrat bladabindi remote backdoor autorun-reg pyinstaller susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
autorun micro shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Connection attempt
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Enabling the 'hidden' option for recently created files
Connection attempt to an infection source
Unauthorized injection to a recently created process
Blocking the User Account Control
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Launching a tool to kill processes
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected vbnet
Verdict:
Malicious
Labled as:
Backdoor.Marte.VenomRAT.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Python Stealer, Exela Stealer, Njrat
Detection:
malicious
Classification:
rans.phis.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Detected generic credential text file
Disables UAC (registry)
Disables Windows Defender (via service or powershell)
Disables zone checking for all users
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the windows firewall
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Capture Wi-Fi password
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Schedule system process
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Exela Stealer
Yara detected Generic Python Stealer
Yara detected Njrat
Yara detected Python Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640293 Sample: XWCTtOuD5e.exe Startdate: 17/03/2025 Architecture: WINDOWS Score: 100 105 thursday-bytes.gl.at.ply.gg 2->105 107 store1.gofile.io 2->107 109 3 other IPs or domains 2->109 139 Suricata IDS alerts for network traffic 2->139 141 Found malware configuration 2->141 143 Malicious sample detected (through community Yara rule) 2->143 145 18 other signatures 2->145 11 XWCTtOuD5e.exe 4 2->11         started        14 dllhost.exe 2->14         started        16 dllhost.exe 2->16         started        18 3 other processes 2->18 signatures3 process4 file5 83 C:\Users\user\AppData\Local\Temp\dfwx.exe, PE32+ 11->83 dropped 85 C:\Users\user\AppData\Local\...\Payload.exe, MS-DOS 11->85 dropped 87 C:\Users\user\AppData\...\XWCTtOuD5e.exe.log, CSV 11->87 dropped 20 dfwx.exe 92 11->20         started        24 Payload.exe 1 7 11->24         started        process6 file7 73 C:\Users\...\_quoting_c.cp311-win_amd64.pyd, PE32+ 20->73 dropped 75 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 20->75 dropped 77 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 20->77 dropped 81 64 other malicious files 20->81 dropped 147 Drops PE files to the startup folder 20->147 149 Modifies the windows firewall 20->149 151 Tries to harvest and steal WLAN passwords 20->151 153 Gathers network related connection and port information 20->153 26 dfwx.exe 81 20->26         started        79 C:\ProgramData\dllhost.exe, MS-DOS 24->79 dropped 155 Antivirus detection for dropped file 24->155 157 Multi AV Scanner detection for dropped file 24->157 159 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->159 161 Sets debug register (to hijack the execution of another thread) 24->161 31 dllhost.exe 5 10 24->31         started        signatures8 process9 dnsIp10 111 ip-api.com 208.95.112.1, 49738, 80 TUT-ASUS United States 26->111 113 api.gofile.io 51.91.7.6 OVHFR France 26->113 117 4 other IPs or domains 26->117 89 C:\Users\user\AppData\Local\...\dfwx.exe, PE32+ 26->89 dropped 91 C:\ProgramData\Microsoft\Windows\...\dfwx.exe, PE32+ 26->91 dropped 93 C:\Users\user\AppData\...\places.sqlite-shm, data 26->93 dropped 103 8 other malicious files 26->103 dropped 163 Found many strings related to Crypto-Wallets (likely being stolen) 26->163 165 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 26->165 167 Tries to harvest and steal browser information (history, passwords, etc) 26->167 175 5 other signatures 26->175 33 cmd.exe 26->33         started        36 cmd.exe 26->36         started        38 cmd.exe 26->38         started        46 13 other processes 26->46 115 thursday-bytes.gl.at.ply.gg 147.185.221.26, 49729, 49736, 49739 SALSGIVERUS United States 31->115 95 C:\Users\user\Desktop\ransxm.exe, PE32+ 31->95 dropped 97 C:\Users\user\Desktop\ransxm.dll, PE32 31->97 dropped 99 C:\...\caa5ab06fdce65c809c563c98d39620a.exe, MS-DOS 31->99 dropped 101 C:\Users\user\Desktop\hello.mp3, Audio 31->101 dropped 169 Antivirus detection for dropped file 31->169 171 System process connects to network (likely due to code injection or exploit) 31->171 173 Multi AV Scanner detection for dropped file 31->173 177 7 other signatures 31->177 40 cmd.exe 31->40         started        42 cmd.exe 31->42         started        44 cmd.exe 31->44         started        48 5 other processes 31->48 file11 signatures12 process13 signatures14 119 Uses cmd line tools excessively to alter registry or file data 33->119 121 Uses netsh to modify the Windows network and firewall settings 33->121 123 Modifies Windows Defender protection settings 33->123 125 Uses attrib.exe to hide files 33->125 55 2 other processes 33->55 57 4 other processes 36->57 50 WMIC.exe 38->50         started        53 conhost.exe 38->53         started        127 Disables Windows Defender (via service or powershell) 40->127 59 2 other processes 40->59 61 2 other processes 42->61 63 2 other processes 44->63 129 Tries to harvest and steal WLAN passwords 46->129 65 24 other processes 46->65 67 7 other processes 48->67 process15 signatures16 131 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 50->131 133 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 57->133 135 Loading BitLocker PowerShell Module 59->135 137 Disables UAC (registry) 61->137 69 chcp.com 63->69         started        71 chcp.com 65->71         started        process17
Threat name:
ByteCode-MSIL.Backdoor.MarteVenomRAT
Status:
Malicious
First seen:
2025-03-14 08:50:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
28 of 36 (77.78%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:exelastealer family:njrat botnet:victim collection defense_evasion discovery execution persistence privilege_escalation pyinstaller spyware stealer trojan upx
Behaviour
Collects information from the system
Detects videocard installed
Gathers network information
Gathers system information
Modifies registry key
Runs net.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Views/modifies file attributes
Browser Information Discovery
Detects Pyinstaller
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
Permission Groups Discovery: Local Groups
System Network Configuration Discovery: Wi-Fi Discovery
System Network Connections Discovery
Launches sc.exe
Enumerates processes with tasklist
Hide Artifacts: Hidden Files and Directories
UPX packed file
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Network Service Discovery
Checks computer location settings
Clipboard Data
Deletes itself
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Modifies Windows Firewall
Stops running service(s)
Grants admin privileges
Exela Stealer
Exelastealer family
Njrat family
UAC bypass
njRAT/Bladabindi
Malware Config
C2 Extraction:
thursday-bytes.gl.at.ply.gg:55648
Verdict:
Malicious
Tags:
njrat bladabindi
YARA:
n/a
Unpacked files
SH256 hash:
a7deeabed9261564ba79c04d3909539ec31bada0b1c4e16755d759f742fb9818
MD5 hash:
3339f240ffeb755b2f4874cbd4d0bbf7
SHA1 hash:
c81181e483cdfc5fc552f22b3dcfa0cd2782cf34
SH256 hash:
546d9239f490969209e09e31d02687c5ebe6b28174235993bb0335ddb999bcd4
MD5 hash:
ed2927604c940b24d37920cf1698a222
SHA1 hash:
ae1d50eeb7d86c86b63e7ce55874c75e4f947d0e
SH256 hash:
ae385532d09886dc7d2b36089e513304c544e68e5588681a6c902f73f5e5762b
MD5 hash:
9fc185834cdeeb1a3f426dbe908b2d96
SHA1 hash:
4bbc1a97542899b779fc40e081bc2de7dc094fa0
Detections:
PyInstaller
SH256 hash:
ea05574cdb9df745bd3ace47b5b44a5728178fa9c8294d8fab58c44059eb5fb7
MD5 hash:
c3978250bdb8a39518d771c4911113d7
SHA1 hash:
bfd699c4fcbea203f0398c5d2061d1d99d9f4b8f
Detections:
MAL_Winnti_Sample_May18_1 CN_disclosed_20180208_c Unknown_Malware_Sample_Jul17_2 Njrat INDICATOR_SUSPICIOUS_EXE_RawPaste_URL MALWARE_Win_NjRAT
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:upx_largefile
Author:k3nr9
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments