Windows Analysis Report
1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe

Overview

General Information

Sample name: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
Analysis ID: 1534535
MD5: ac189390185909cd4138ef73a54e008f
SHA1: 2a01ed827c6521900c933d3a0ee47f7e5eff1a2b
SHA256: ca1b3be0a86b0a15e7f875c23e541f692cbe58c2d455e685c09f0fcb5bd9a965
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.

Detection

Mofksys, Njrat
Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected Mofksys
Yara detected Njrat
Sample file is different than original file name gathered from version info

Classification

Name Description Attribution Blogpost URLs Link
Mofksys No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.mofksys
Name Description Attribution Blogpost URLs Link
NjRAT RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat

AV Detection

barindex
Source: Yara match File source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE

Spreading

barindex
Source: Yara match File source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE

E-Banking Fraud

barindex
Source: Yara match File source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE
Source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe Binary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"? vs 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
Source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe Binary or memory string: OriginalFilenameClient1.exe4 vs 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
Source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe Binary or memory string: A*\AF:\RFD\xNewCode\xNewPro\xT\trjFN\Project1.vbp
Source: classification engine Classification label: mal56.spre.troj.winEXE@0/0@0/0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE
No contacted IP infos