MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cebc70d2a5836d2a510eaf274a8e4e2e1ca815aa14fe31406cd05fda7ea7220b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: cebc70d2a5836d2a510eaf274a8e4e2e1ca815aa14fe31406cd05fda7ea7220b
SHA3-384 hash: 3f48710cee5c59968180db856d55d7d76439c5626ffdc4aea0367931eeded64e0bb42fb5519480be0e246b988dec7a2f
SHA1 hash: d6cd48fa1feebd5a2ca58a2f403bc5ba1c4c8bc2
MD5 hash: b0aaebbca59d83f6b3bcd754b13fd194
humanhash: pluto-kitten-mockingbird-sixteen
File name:cebc70d2a5836d2a510eaf274a8e4e2e1ca815aa14fe31406cd05fda7ea7220b
Download: download sample
Signature njrat
File size:169'472 bytes
First seen:2020-11-12 14:08:43 UTC
Last seen:2024-07-24 21:33:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 720f62ecaae027b5c3ec6686644322e9 (12 x njrat, 8 x RevengeRAT, 4 x AgentTesla)
ssdeep 3072:oRe01Tn/48+2QS1D0xKBrTBfFvj4bq57eX20mwu9z1c:oH1T/F+2QS1Y4TB9vj48jT9K
Threatray 61 similar samples on MalwareBazaar
TLSH A2F3AE10B5C0C2B3D4BB113648E5CF359A26353A17BE95D3FB992FA66E113E09A313C9
Reporter seifreed
Tags:NjRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process with a hidden window
Connection attempt
Launching the process to change the firewall settings
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-11-12 14:11:23 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:njrat evasion persistence trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Modifies Windows Firewall
njRAT/Bladabindi
Unpacked files
SH256 hash:
cebc70d2a5836d2a510eaf274a8e4e2e1ca815aa14fe31406cd05fda7ea7220b
MD5 hash:
b0aaebbca59d83f6b3bcd754b13fd194
SHA1 hash:
d6cd48fa1feebd5a2ca58a2f403bc5ba1c4c8bc2
SH256 hash:
a12b58e002f4e36b980fd45d277059682b3be971e59f1a162ace72ae29f93a17
MD5 hash:
f6388944954524af3f258ee8a4dd9b09
SHA1 hash:
f285e4dc9229e3463c5a8d149e45722c419c42d2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments