Windows
Analysis Report
1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
Overview
General Information
Sample name: | 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe |
Analysis ID: | 1534535 |
MD5: | ac189390185909cd4138ef73a54e008f |
SHA1: | 2a01ed827c6521900c933d3a0ee47f7e5eff1a2b |
SHA256: | ca1b3be0a86b0a15e7f875c23e541f692cbe58c2d455e685c09f0fcb5bd9a965 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mofksys | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
NjRAT | RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored. |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Njrat | Yara detected Njrat | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | File source: |
Spreading |
---|
Source: | File source: |
E-Banking Fraud |
---|
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary or memory string: |
Source: | Classification label: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | 1 System Information Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1534535 |
Start date and time: | 2024-10-16 00:24:38 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 24s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe |
Detection: | MAL |
Classification: | mal56.spre.troj.winEXE@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse as no analysis process or sample was found
- Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net
- VT rate limit hit for: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
File type: | |
Entropy (8bit): | 5.642370732490619 |
TrID: |
|
File name: | 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe |
File size: | 175'742 bytes |
MD5: | ac189390185909cd4138ef73a54e008f |
SHA1: | 2a01ed827c6521900c933d3a0ee47f7e5eff1a2b |
SHA256: | ca1b3be0a86b0a15e7f875c23e541f692cbe58c2d455e685c09f0fcb5bd9a965 |
SHA512: | 482568bd41b12792b3003e10be495eaa082bf4a21adea9df58869aed88c05752bd70b4d59fd7675f6463733e9846ce6c78ae8a0c0067ef9181b3fb4a3ae7e9a2 |
SSDEEP: | 1536:O6DtkFouTE1J5/vERR+MuXwZmTBby1BwgjBiEERNUG15EHsVZq8DyS8lWd:3OFoA4JJET+MuXxbCBBONUG1m2NyvlWd |
TLSH: | A6043A23AF94541BD8574EF03C35E7A9BAA14E360B91EC0B62ADBB542A7164371F031F |
File Content Preview: | MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t.....y...........z.......................Rich............PE..L...f2YQ.....................0.......)............@............. |
Icon Hash: | 00928e8e8686b000 |