Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe

Overview

General Information

Sample name:1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
Analysis ID:1534529
MD5:ad7c5d172b6fe743db4585f420a4265c
SHA1:14abd6a4ba706dab1c35e9c9d8c0c1ec374b213e
SHA256:286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.

Detection

Mofksys, Njrat
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Mofksys
Yara detected Njrat
May infect USB drives
Sample file is different than original file name gathered from version info
Yara signature match

Classification

NameDescriptionAttributionBlogpost URLsLink
MofksysNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.mofksys
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
No configs have been found
SourceRuleDescriptionAuthorStrings
1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeJoeSecurity_MofksysYara detected MofksysJoe Security
    1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeJoeSecurity_NjratYara detected NjratJoe Security
      1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x295ad:$a1: get_Registry
      • 0x2afcd:$a3: Download ERROR
      • 0x2b2bf:$a5: netsh firewall delete allowedprogram "
      1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x2b1b5:$a1: netsh firewall add allowedprogram
      • 0x2b3af:$b1: [TAP]
      • 0x2b355:$b2: & exit
      • 0x2b321:$c1: md.exe /k ping 0 & del
      1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x2b2bf:$s1: netsh firewall delete allowedprogram
      • 0x2b1b5:$s2: netsh firewall add allowedprogram
      • 0x2b31f:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x2afa9:$s4: Execute ERROR
      • 0x2b009:$s4: Execute ERROR
      • 0x2afcd:$s5: Download ERROR
      • 0x2b365:$s6: [kl]
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Yara matchFile source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE

      Spreading

      barindex
      Source: Yara matchFile source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeBinary or memory string: autorun.inf
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeBinary or memory string: [autorun]
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE

      System Summary

      barindex
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeBinary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"? vs 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
      Source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exeBinary or memory string: A*\AF:\RFD\xNewCode\xNewPro\xT\trjFN\Project1.vbp
      Source: classification engineClassification label: mal64.spre.troj.winEXE@0/0@0/0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure1
      Replication Through Removable Media
      Windows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
      Peripheral Device Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
      System Information Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=01729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1534529
        Start date and time:2024-10-16 00:12:39 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 43s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:1
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
        Detection:MAL
        Classification:mal64.spre.troj.winEXE@0/0@0/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Unable to launch sample, stop analysis
        • No process behavior to analyse as no analysis process or sample was found
        • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
        • Exclude process from analysis (whitelisted): dllhost.exe
        • VT rate limit hit for: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:MS-DOS executable, MZ for MS-DOS
        Entropy (8bit):6.000949909303966
        TrID:
        • Generic Win/DOS Executable (2004/3) 49.94%
        • DOS Executable Generic (2002/1) 49.89%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
        File name:1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
        File size:181'524 bytes
        MD5:ad7c5d172b6fe743db4585f420a4265c
        SHA1:14abd6a4ba706dab1c35e9c9d8c0c1ec374b213e
        SHA256:286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9
        SHA512:5b0d7a5b2a22029c4c0915694a4cd4a0acbcfaad93de7c3ec06b507b95389974e136c274e4fa3a86d9d105e73e12199541cc5948fcbd324dcabe2d0b01bc64ff
        SSDEEP:3072:3OFoA4JJET+MuXxbCBBONUG1m2+7i0icmFqYFE:3wVQguXxbkG1mq0ipK
        TLSH:BD044D176A90502ED86E8DF224B0D6197A729E270F909C1B63AEBB102E7714377F135F
        File Content Preview:MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t.....y...........z.......................Rich............PE..L...f2YQ.....................0.......)............@.............
        Icon Hash:90cececece8e8eb0
        No network behavior found
        No statistics
        No system behavior
        No disassembly