MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f23f0f4b55b95bd8a7b122769949edf4bd686aea35215286d1551d2c2dfe150c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
njrat
Vendor detections: 8
| SHA256 hash: | f23f0f4b55b95bd8a7b122769949edf4bd686aea35215286d1551d2c2dfe150c |
|---|---|
| SHA3-384 hash: | 7577136cefec20a341b230e4e1e8e475dbdbc10a6797207410cd632d6204aa30095ac13b73aeca7b0df1239d284c46c6 |
| SHA1 hash: | 670bc790924674c2fadd958f283e8de32729a5ed |
| MD5 hash: | f85eecbe1d9599f267b642fd1935fea7 |
| humanhash: | undress-minnesota-muppet-magazine |
| File name: | Terraria.rar |
| Download: | download sample |
| Signature | njrat |
| File size: | 16'744 bytes |
| First seen: | 2023-12-22 14:16:11 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 384:Mspd++oIj53tZwVbCSrssUEbua4IqzNOOKlNWQP:MspU+3024sWbua4LGnP |
| TLSH | T1D372E134FB25862F0433C22067507DB5C77014C3FAF0587EB6F358A488DB69D96D0A5A |
| TrID | 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1) 38.4% (.RAR) RAR compressed archive (gen) (5000/1) |
| Reporter | Anonymous |
| Tags: | NjRAT rar |
Anonymous
Retrieved from https://raw.githubusercontent.com/CatGamesYT/TerrariaSetup/main/Terraria.rarIntelligence
File Origin
# of uploads :
1
# of downloads :
112
Origin country :
HUFile Archive Information
This file archive contains 1 file(s), sorted by their relevance:
| File name: | Terraria.exe |
|---|---|
| File size: | 37'888 bytes |
| SHA256 hash: | a9d17bd42531c52bcc16e7424db420bb8c56834962cc04209f5d6f937eccff47 |
| MD5 hash: | 6dba8d29c2a91741248a0afe4d2d8370 |
| MIME type: | application/x-dosexec |
| Signature | njrat |
Vendor Threat Intelligence
Result
Verdict:
Unknown
File Type:
PE File
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
cmd explorer fingerprint keylogger lolbin lolbin netsh njrat rat replace stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.NjRAT
Status:
Malicious
First seen:
2023-12-22 14:17:04 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
19 of 23 (82.61%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
njrat
Score:
10/10
Tags:
family:njrat botnet:cheat evasion
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Legitimate hosting services abused for malware hosting/C2
Modifies Windows Firewall
Malware Config
C2 Extraction:
6.tcp.eu.ngrok.io:19960
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
njrat
rar f23f0f4b55b95bd8a7b122769949edf4bd686aea35215286d1551d2c2dfe150c
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.