Report - Google%20Chrome.exe

njRAT backdoor PE File .NET EXE PE32
ScreenShot
Created 2024.10.17 14:42 Machine s1_win7_x6403
Filename Google%20Chrome.exe
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
6
Behavior Score
1.2
ZERO API file : mailcious
VT API (file) 62 detected (AIDetectMalware, lA1H, GenericFC, S20328680, Jalapeno, Unsafe, Save, malicious, confidence, 100%, Bladabindi, Dnldr25, DDDI, gen2, Windows, Njrat, Gen8, ecsqgn, CLASSIC, Gen7, BLADABI, Real Protect, moderate, score, Static AI, Malicious PE, Autoit, Detected, BA@7oej5x, Kryptik, Eldorado, R268107, AvsMofer, susgen, RansomWare)
md5 79de31cb069a4e060aae0414fbd940fe
sha256 f6d4e7c049743bad1addfae2276aa9a36a957eaa1af97cc4afedb3c039168d2d
ssdeep 1536:f4qepvQVk3jCZHZfcV8ihnCwYMD0GsNXpyIVz0bd1/VhPuIpAW9+2IVBF7l:6vT3Wnqp5sMD0nXyIVzk1/3f+2Iz
imphash f34d5f2d4577ed6d9ceec516c1f5a744
impfuzzy 3:rGsLdAIEK:tf
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 62 AntiVirus engines on VirusTotal as malicious

Rules (4cnts)

Level Name Description Collection
danger Win_Backdoor_njRAT_Zero Win Backdoor njRAT binaries (upload)
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

mscoree.dll
 0x402000 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure