MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c925d43deca61d344a00221f897dbe35175272a0984ffbba675194fe48842b3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: c925d43deca61d344a00221f897dbe35175272a0984ffbba675194fe48842b3f
SHA3-384 hash: 94a275ec326c8376bd7bf43b643e2595655440a008a54626afc941b880332300c318b22348010b95217300204e1b68f8
SHA1 hash: 27f1e1b199addfa25dc8aaf5b1b83361381cf322
MD5 hash: b5be0922744c9dafe464a01c468de91f
humanhash: iowa-arizona-alabama-mars
File name:c925d43deca61d344a00221f897dbe35175272a0984ffbba675194fe48842b3f
Download: download sample
Signature njrat
File size:1'897'472 bytes
First seen:2020-06-29 07:11:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 49152:5hUKHkl6KTqiD90Qt8toqJJCsU0Uyd04vOANyjaV+no7ws6:5aakl6KTqiRCmmJCsUitYYws6
Threatray 48 similar samples on MalwareBazaar
TLSH 5295D55BF990AB36C02A2C73C4966D7D82D9C69F5F42D707B2A8072823523FDD39614B
Reporter JAMESWT_WT
Tags:NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-06-29 00:11:42 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
28 of 48 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence trojan family:njrat evasion
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Adds Run entry to start application
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
njRAT/Bladabindi
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments