MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cfb6b2b831592f1ebd43929977ae4963f8c2b3b2472214c82c3c3c1513a6b54f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: cfb6b2b831592f1ebd43929977ae4963f8c2b3b2472214c82c3c3c1513a6b54f
SHA3-384 hash: 2c419a3b1b972f66df3ad709aa31f417de419b3a23f93c177fa9e4893ab358b96b3dcb7d1c7ee6a917b49973f5ebb573
SHA1 hash: 120b12ffcf2f1510120bc22a10a54902200055d6
MD5 hash: a4b198cf7701e15ce121c72fd28ab4c0
humanhash: colorado-apart-mango-lamp
File name:cfb6b2b831592f1ebd43929977ae4963f8c2b3b2472214c82c3c3c1513a6b54f
Download: download sample
Signature njrat
File size:3'341'312 bytes
First seen:2020-06-29 07:09:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bc70c4fa605f17c85050b7c7b6d42e44 (15 x njrat, 12 x RedLineStealer, 10 x AgentTesla)
ssdeep 98304:4viz/27qWGq/TzuqCDl2Ptao7jg5lPNU:4viq75/Tzuf1LNU
Threatray 13 similar samples on MalwareBazaar
TLSH 73F5334076CC012BC9B113B114FD23971FB8BCB253759787A0C661CE199A491BAF7FA6
Reporter JAMESWT_WT
Tags:NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-06-29 04:23:31 UTC
File Type:
PE (Exe)
Extracted files:
765
AV detection:
21 of 31 (67.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence evasion trojan family:njrat
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Modifies service
Adds Run entry to start application
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
njRAT/Bladabindi
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments