MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dd23a9dd9ad1c9be3580c478179915bfcc79a23bc49161f49ee08111ceab57eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
njrat
Vendor detections: 13
| SHA256 hash: | dd23a9dd9ad1c9be3580c478179915bfcc79a23bc49161f49ee08111ceab57eb |
|---|---|
| SHA3-384 hash: | cc7db0911bed02e4e0e3ef550314984e1e33435ce256024a3cd4601c468e49f343792e5859c64c92e8d5f0c669a442dc |
| SHA1 hash: | e309c1fa1053a6d732e2f43aa18c3c7d960f0921 |
| MD5 hash: | 95fb80c07272283986d852ba2bf78035 |
| humanhash: | queen-crazy-vermont-earth |
| File name: | 95FB80C07272283986D852BA2BF78035.exe |
| Download: | download sample |
| Signature | njrat |
| File size: | 2'818'148 bytes |
| First seen: | 2022-03-14 22:21:30 UTC |
| Last seen: | 2022-03-14 23:55:52 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 47bc19dfc1ae2e981c4482fe1911174d (1 x njrat) |
| ssdeep | 49152:T9L1R2DvORR8swPgk/87JMp50/d5XIDg+XZKaRJ1E2FRFPBAIUqwG8sDIT3:TRYvg1MgYKJamXIsRapUhG8s2 |
| Threatray | 86 similar samples on MalwareBazaar |
| TLSH | T141D533F0EBA0A53BD694E07C685EF7258C14898A45967B12E4E03C2EBC7BB0F25F1D54 |
| File icon (PE): | |
| dhash icon | 204cb27169b21428 (1 x njrat, 1 x DarkComet) |
| Reporter | |
| Tags: | exe NjRAT RAT |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 23.95.132.55:48339 | https://threatfox.abuse.ch/ioc/395249/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
350
Origin country :
n/a
Vendor Threat Intelligence
Detection:
njRat
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
darkkomet exploit greyware overlay packed shell32.dll virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
njRat RedLine
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Detected njRat
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Tries to evade analysis by execution special instruction which cause usermode exception
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Yara detected Njrat
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2022-03-12 15:25:00 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
24 of 39 (61.54%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
njrat
Similar samples:
+ 76 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:njrat family:redline botnet:cheat botnet:hacked evasion infostealer persistence trojan
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
RedLine
RedLine Payload
njRAT/Bladabindi
Malware Config
C2 Extraction:
23.95.132.55:48339
23.95.132.55:5552
23.95.132.55:5552
Unpacked files
SH256 hash:
ab1be4329a692dbd88e81a2197c2dbc98abde8c9a2c5a91aa0ad5d906ba0dcd3
MD5 hash:
4838b66c7387b9c5b6d6fc7b2a03e456
SHA1 hash:
194be968a9c5b187c9fade04a41f3d8ad601cacd
Detections:
win_njrat_w1
win_njrat_g1
SH256 hash:
1f42633377481ac6824093549eb4778f7db0d44c8c7f22e828ee0c5511f928dc
MD5 hash:
0cc4c15fe7c15fa0923655b7290a428e
SHA1 hash:
fd6fd5bba7000e6f25aaa061a9e123b7e041aa2f
SH256 hash:
cc3464233e8cf82a26c6f1fa879bab7c23946c12506cc2daab935d00dd87b8a6
MD5 hash:
dc49ab7c1fc261f57880638fe341f809
SHA1 hash:
e8c6d574e22877cbbad0c4bfb2a379b1e2f23535
SH256 hash:
523d52722bdd2160566e34040dee9a47fc3137feeff305daa51d3c57dbbe5c70
MD5 hash:
f09c93bd153981c069a97928c36ca7cb
SHA1 hash:
9a09f00426251c408c2becf61ef3fcb0e74d356a
SH256 hash:
081dfd5b42a620a0d3e1a934b0b01623fe501adc2f576e7decda9939efc865ba
MD5 hash:
fe9a574afd7088b0c4cda6209533513f
SHA1 hash:
395b538a3085022f698ad345d49e2417df168b78
SH256 hash:
48732c638c2e7dabef1f991e8b47264604409e96d02bde5c1036f787c1a9824e
MD5 hash:
f59805f618e77fcad80e820a179ac0d0
SHA1 hash:
00c62b9383d71ddad4a0dea2cf64c3ba364cc53d
SH256 hash:
8f781dad2cd705d6ba672cf6b50cbeb8029157f130ae5096fa0756484ac6722d
MD5 hash:
d381c9079af8dc8e11f08fc1c4bb5d21
SHA1 hash:
a820039765ae3a743d61c7d582243a8b4f566f74
SH256 hash:
5892ff57735d691576646d82c692c4a595b28f2576007c3455ff8f3da91ef45f
MD5 hash:
54c66980fcc6c525f4a8043de1be11f4
SHA1 hash:
4a01931f951aeaeea9772a7119783225a975d8f9
SH256 hash:
8e339fee1030be8f787afd6890e0635fe7311bffd3b9308bf0e55d801b6ab8d0
MD5 hash:
caa1653c068e2a8611a4862ece18df21
SHA1 hash:
228c0a86c8f373f28cce952613e41d60e8080ab8
SH256 hash:
dd23a9dd9ad1c9be3580c478179915bfcc79a23bc49161f49ee08111ceab57eb
MD5 hash:
95fb80c07272283986d852ba2bf78035
SHA1 hash:
e309c1fa1053a6d732e2f43aa18c3c7d960f0921
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.96
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.