Source: Yara match |
File source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Source: Yara match |
File source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Binary or memory string: autorun.inf |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Binary or memory string: [autorun] |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
String found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0 |
Source: Yara match |
File source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Matched rule: Identify njRat Author: Brian Wallace @botnet_hunter |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Binary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"? vs 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Matched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Binary or memory string: A*\AF:\RFD\xNewCode\xNewPro\xT\trjFN\Project1.vbp |
Source: classification engine |
Classification label: mal64.spre.troj.winEXE@0/0@0/0 |
Source: Yara match |
File source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |
Source: Yara match |
File source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE |