MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d98190863e8f53c385de8531ac7e5e89dc61cdaf17df688614ded12c24c78d31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d98190863e8f53c385de8531ac7e5e89dc61cdaf17df688614ded12c24c78d31
SHA3-384 hash: 1f19d4a37e3fbd5d037df032a791b5c4f7f9959828fd9c1835d015ac406a61c3364f6c085cd7b7ed9799d4f892705eff
SHA1 hash: 74b5ab4285671757cb3c53e2f3cab9a3aeef2980
MD5 hash: 743733d9c3806327fb1f93a8eae395fa
humanhash: kansas-vegan-wolfram-item
File name:d98190863e8f53c385de8531ac7e5e89dc61cdaf17df688614ded12c24c78d31
Download: download sample
Signature njrat
File size:457'969 bytes
First seen:2020-11-13 15:20:25 UTC
Last seen:2024-07-24 22:01:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 6144:k3VmI+12XqkuJGKmDP3y53RSIT+t7UUHZIoh/ipIiGK1qftoPWc9:MVmz2XqkuAX6lT+t7DH+DpIiGKjPWc9
Threatray 431 similar samples on MalwareBazaar
TLSH 14A4E002FAD285F2D5220936462E9B41B53D7D381F35CEABF3D82E5DD8311A1A634B63
Reporter seifreed
Tags:NjRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
Running batch commands
Creating a process from a recently created file
Enabling the 'hidden' option for recently created files
Creating a file in the %AppData% directory
Creating a process with a hidden window
Connection attempt
Unauthorized injection to a recently created process
Launching the process to change the firewall settings
Creating a file in the mass storage device
Enabling threat expansion on mass storage devices by creating the autorun.inf autorun file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-11-13 15:22:27 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops autorun.inf file
Modifies service
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
Unpacked files
SH256 hash:
d98190863e8f53c385de8531ac7e5e89dc61cdaf17df688614ded12c24c78d31
MD5 hash:
743733d9c3806327fb1f93a8eae395fa
SHA1 hash:
74b5ab4285671757cb3c53e2f3cab9a3aeef2980
SH256 hash:
af7bce0d86d6d8f2c20d56571bc442d999e9e842a1eb8c267ff290bec6bc7c73
MD5 hash:
d8beebcea6e8b8f805d81345c53a72b9
SHA1 hash:
ed13898cc32c61a85590abf1a3387cabaa81ec57
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments