MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fcbdafcedb7e9d18b0c8b640e375975320e6f74fd4170fea17b2ca210215d855. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



njrat


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fcbdafcedb7e9d18b0c8b640e375975320e6f74fd4170fea17b2ca210215d855
SHA3-384 hash: 53beb8f69e83204d0922506b442fc9136c9c7bfa11690f3836ad00c3bd63d76481b3843175890180517038bb23b5dfec
SHA1 hash: 0d61ce6c6356a2d662ad6ef8082cede3a34d8f9a
MD5 hash: 34993c4f9d2c16968ebf5d15efef1987
humanhash: ack-tennis-hamper-steak
File name:fcbdafcedb7e9d18b0c8b640e375975320e6f74fd4170fea17b2ca210215d855
Download: download sample
Signature njrat
File size:367'743 bytes
First seen:2020-06-10 11:33:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ae9f6a32bb8b03dce37903edbc855ba1 (28 x CryptOne, 18 x RedLineStealer, 15 x njrat)
ssdeep 6144:hoYJ7Xar2B0crns+PuEIzY/5B51Hu8H1ZX+t4MYaG8V/jIAtmz75WEy7/o1:hoQ7Xar2BHs/EIzm/OeZX+t4MYpjmmzn
Threatray 281 similar samples on MalwareBazaar
TLSH 3A74D031BBC185B1D57219354AF997319A3D7D202F358A5F93E43E2D5E304C0AA29BB3
Reporter JAMESWT_WT
Tags:NjRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-06-04 16:38:19 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Program crash
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments