Windows
Analysis Report
1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
Overview
General Information
Sample name: | 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Analysis ID: | 1534529 |
MD5: | ad7c5d172b6fe743db4585f420a4265c |
SHA1: | 14abd6a4ba706dab1c35e9c9d8c0c1ec374b213e |
SHA256: | 286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mofksys | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
NjRAT | RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored. |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
MALWARE_Win_NjRAT | Detects NjRAT / Bladabindi | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | File source: |
Spreading |
---|
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | String found in binary or memory: |
E-Banking Fraud |
---|
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary or memory string: |
Source: | Classification label: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | 1 Peripheral Device Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1534529 |
Start date and time: | 2024-10-16 00:12:39 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 43s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
Detection: | MAL |
Classification: | mal64.spre.troj.winEXE@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse as no analysis process or sample was found
- Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
- Exclude process from analysis (whitelisted): dllhost.exe
- VT rate limit hit for: 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe
File type: | |
Entropy (8bit): | 6.000949909303966 |
TrID: |
|
File name: | 1729029847909bd6babf7b44250bc69e37cfeb1b1668fcd569b58c775e8e5ded95c7ac3d14184.dat-decoded.exe |
File size: | 181'524 bytes |
MD5: | ad7c5d172b6fe743db4585f420a4265c |
SHA1: | 14abd6a4ba706dab1c35e9c9d8c0c1ec374b213e |
SHA256: | 286e54c84b3c8b6bc6c202c9719365c31156c062e90cc1452ef1206f8710e3f9 |
SHA512: | 5b0d7a5b2a22029c4c0915694a4cd4a0acbcfaad93de7c3ec06b507b95389974e136c274e4fa3a86d9d105e73e12199541cc5948fcbd324dcabe2d0b01bc64ff |
SSDEEP: | 3072:3OFoA4JJET+MuXxbCBBONUG1m2+7i0icmFqYFE:3wVQguXxbkG1mq0ipK |
TLSH: | BD044D176A90502ED86E8DF224B0D6197A729E270F909C1B63AEBB102E7714377F135F |
File Content Preview: | MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t.....y...........z.......................Rich............PE..L...f2YQ.....................0.......)............@............. |
Icon Hash: | 90cececece8e8eb0 |