MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b54b69f400656ee17e279fdc1d1e9ae7f46cf507642e87756e3568caf86e2613. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 13


Intelligence 13 IOCs YARA 7 File information Comments

SHA256 hash: b54b69f400656ee17e279fdc1d1e9ae7f46cf507642e87756e3568caf86e2613
SHA3-384 hash: 91e1e7a85c185792bee438d17b10e7e21f30736a383b418c4f226daa58b1c56af0b8c4a456811a36348142ebc24422d3
SHA1 hash: 037555b162f38f4a7934b68dcb47caf706822dd0
MD5 hash: 3d6079d3eafbb38ea6f99f62507aa713
humanhash: michigan-indigo-spring-harry
File name:file
Download: download sample
Signature njrat
File size:1'450'496 bytes
First seen:2026-02-03 01:43:32 UTC
Last seen:2026-02-03 02:19:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash dd71a0fba7b9bcb4ed897c7097ba15c6 (1 x njrat)
ssdeep 24576:tG1qi4bd2456L4ZRfqH3gZRFAx0QHPMfQMgcpoeVh6WkIuSLwov16DjMsmyxK:SqiW4456L4ZRfc3gfFhQvPW6ecWkIuS0
TLSH T1F3650107B2D554ACD056C138931AD673EA27BC8E0521B9BF13E5AA303EA5F616F1CB4C
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543 NjRAT


Avatar
Bitsight
url: http://130.12.180.43/files/1773787694/GwcgFKk.exe

Intelligence


File Origin
# of uploads :
13
# of downloads :
137
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-02-03 01:45:47 UTC
Tags:
auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
malware
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% directory
Launching a process
Creating a window
Connection attempt
DNS request
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug base64 expand krypt lolbin packed
Result
Gathering data
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Packed.MintZard
Status:
Malicious
First seen:
2026-02-03 01:44:42 UTC
File Type:
PE+ (Exe)
Extracted files:
6
AV detection:
6 of 36 (16.67%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar persistence spyware trojan
Behaviour
Modifies registry class
NTFS ADS
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Quasar RAT
Quasar family
Quasar payload
Unpacked files
SH256 hash:
b54b69f400656ee17e279fdc1d1e9ae7f46cf507642e87756e3568caf86e2613
MD5 hash:
3d6079d3eafbb38ea6f99f62507aa713
SHA1 hash:
037555b162f38f4a7934b68dcb47caf706822dd0
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:dgaagas
Author:Harshit
Description:Uses certutil.exe to download a file named test.txt
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

njrat

Executable exe b54b69f400656ee17e279fdc1d1e9ae7f46cf507642e87756e3568caf86e2613

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments