Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe

Overview

General Information

Sample name:1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
Analysis ID:1534535
MD5:ac189390185909cd4138ef73a54e008f
SHA1:2a01ed827c6521900c933d3a0ee47f7e5eff1a2b
SHA256:ca1b3be0a86b0a15e7f875c23e541f692cbe58c2d455e685c09f0fcb5bd9a965
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.

Detection

Mofksys, Njrat
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Mofksys
Yara detected Njrat
Sample file is different than original file name gathered from version info

Classification

NameDescriptionAttributionBlogpost URLsLink
MofksysNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.mofksys
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
No configs have been found
SourceRuleDescriptionAuthorStrings
1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exeJoeSecurity_MofksysYara detected MofksysJoe Security
    1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exeJoeSecurity_NjratYara detected NjratJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Yara matchFile source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE

      Spreading

      barindex
      Source: Yara matchFile source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE
      Source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exeBinary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"? vs 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
      Source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exeBinary or memory string: OriginalFilenameClient1.exe4 vs 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
      Source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exeBinary or memory string: A*\AF:\RFD\xNewCode\xNewPro\xT\trjFN\Project1.vbp
      Source: classification engineClassification label: mal56.spre.troj.winEXE@0/0@0/0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
      System Information Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1534535
      Start date and time:2024-10-16 00:24:38 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 24s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:1
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
      Detection:MAL
      Classification:mal56.spre.troj.winEXE@0/0@0/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Unable to launch sample, stop analysis
      • No process behavior to analyse as no analysis process or sample was found
      • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net
      • VT rate limit hit for: 1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:MS-DOS executable, MZ for MS-DOS
      Entropy (8bit):5.642370732490619
      TrID:
      • Generic Win/DOS Executable (2004/3) 49.94%
      • DOS Executable Generic (2002/1) 49.89%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
      File name:1729029846d0d0587a6310dfe2e29127dec87eb85e9961141f11ae0c68cc7d81b5df02f2df239.dat-decoded.exe
      File size:175'742 bytes
      MD5:ac189390185909cd4138ef73a54e008f
      SHA1:2a01ed827c6521900c933d3a0ee47f7e5eff1a2b
      SHA256:ca1b3be0a86b0a15e7f875c23e541f692cbe58c2d455e685c09f0fcb5bd9a965
      SHA512:482568bd41b12792b3003e10be495eaa082bf4a21adea9df58869aed88c05752bd70b4d59fd7675f6463733e9846ce6c78ae8a0c0067ef9181b3fb4a3ae7e9a2
      SSDEEP:1536:O6DtkFouTE1J5/vERR+MuXwZmTBby1BwgjBiEERNUG15EHsVZq8DyS8lWd:3OFoA4JJET+MuXxbCBBONUG1m2NyvlWd
      TLSH:A6043A23AF94541BD8574EF03C35E7A9BAA14E360B91EC0B62ADBB542A7164371F031F
      File Content Preview:MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t.....y...........z.......................Rich............PE..L...f2YQ.....................0.......)............@.............
      Icon Hash:00928e8e8686b000
      No network behavior found
      No statistics
      No system behavior
      No disassembly