MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c81f7d157e4b11cba24ea4ff710342bc773bc20718c6de4595102861c1d2a871. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c81f7d157e4b11cba24ea4ff710342bc773bc20718c6de4595102861c1d2a871
SHA3-384 hash: 7422d789a8b5e04706f2a9a4c2d18b6396250d75b73d325db9dbde022edb9afb41f48c03a7bbc59f1a7179740f6b24cc
SHA1 hash: cb151d218a56c514ad437bdaf7d5aefcf7a44ef0
MD5 hash: d66eddc98b2f405f944cdfbdf84a3178
humanhash: friend-eight-social-apart
File name:NJULTITEC73BK39JV5295e9SCkYZKj5REvK.7z
Download: download sample
Signature njrat
File size:196'602 bytes
First seen:2020-05-01 08:41:21 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 3072:tztCPaZpGLiNO00jr8wPrhpSHjj7Zy40fYFJB6nF6k1KWUvsm20lcyenwyJ8abeX:aPaZh0nrKn7Zy4qYFbAcklHm2siwy7b0
TLSH C71412ED5DC3418670A2E1CFF62572AFD1C8039C216661AC8E62667B79D18EAC1F30D6
Reporter abuse_ch
Tags:7z COVID-19 NjRAT nVpn RAT


Avatar
abuse_ch
Malspam distributing njrat:

HELO: smtp1-01.brain.net.pk
Sending IP: 203.128.3.25
From: wonhar <wonhar@brain.net.pk>
Reply-To: <ayala22mark@gmail.com>
Subject: ULTITEC COVID 19 PROTECTIVE CLOTHING
Attachment: NJULTITEC73BK39JV5295e9SCkYZKj5REvK.7z (contains "NJULTITEC73BK39JV5295e9SCkYZKj5REvK.exe")

NjRAT C2:
185.165.153.215:5552

Hosted on nvpn:

% Information related to '185.165.153.0 - 185.165.153.255'

% Abuse contact for '185.165.153.0 - 185.165.153.255' is 'abuse@privacy-matters.co'

inetnum: 185.165.153.0 - 185.165.153.255
netname: PRIVACY_MATTERS
remarks: This prefix belongs to a VPN service provider.
remarks: For us the privacy of our customers matters, which means we store no logs
remarks: related to any IP addresses.
remarks: Spamhaus, please note that blacklisting the clean prefixes of our hosting
remarks: partners and upstream providers is an act of coercion and will no longer
remarks: be tolerated.
remarks: Coercion is punishable by a custodial sentence or by a monetary penalty.
remarks: If you continue such practice we will not only take legal actions against
remarks: your organization, but also make such blackmailing attempts public in the
remarks: media.
country: AT
admin-c: PMVS3-RIPE
tech-c: PMVS3-RIPE
org: ORG-PMVS1-RIPE
status: ASSIGNED PA
mnt-by: PM-MNT
created: 2019-10-18T12:14:26Z
last-modified: 2019-10-18T13:31:16Z
source: RIPE

organisation: ORG-PMVS1-RIPE
org-name: Privacy Matters VPN service
org-type: OTHER
address: 87 Chemin Le Niol, Beau Vallon, Mah�, Seychelles
admin-c: PMVS3-RIPE
tech-c: PMVS3-RIPE
abuse-c: PMVS3-RIPE
mnt-ref: PM-MNT
mnt-by: PM-MNT
created: 2019-10-17T08:39:32Z
last-modified: 2019-10-18T12:49:58Z
source: RIPE # Filtered

role: Privacy Matters - VPN service
address: 87 Chemin Le Niol, Beau Vallon, Mah�, Seychelles
abuse-mailbox: abuse@privacy-matters.co
nic-hdl: PMVS3-RIPE
mnt-by: PM-MNT
created: 2019-10-17T08:29:52Z
last-modified: 2019-10-17T08:38:57Z
source: RIPE # Filtered

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-01 09:35:29 UTC
File Type:
Binary (Archive)
Extracted files:
12
AV detection:
16 of 31 (51.61%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

njrat

7z c81f7d157e4b11cba24ea4ff710342bc773bc20718c6de4595102861c1d2a871

(this sample)

  
Dropping
njrat
  
Delivery method
Distributed via e-mail attachment

Comments