Report - %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe

njRAT backdoor PE File .NET EXE PE32
ScreenShot
Created 2025.02.11 10:55 Machine s1_win7_x6403
Filename %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
10
Behavior Score
4.0
ZERO API file : mailcious
VT API (file) 59 detected (TRFH5, BackdoorNJRat, FIGN, Unsafe, Bladabindi, malicious, confidence, 100%, Ratenjay, Windows, Njrat, Disfa, dtznyx, CLASSIC, Gen7, DownLoader17, BLADABI, Real Protect, moderate, score, DotNet, Static AI, Malicious PE, Autoit, Detected, A@566ygc, Eldorado, Zbot, TScope, k6NlPiHIw7M)
md5 62635b35d2243003a86fce6b46cb49cd
sha256 d722015dcef7d2865e94a180b99fbc57e22931d771fa97c8d336e667bc027008
ssdeep 384:O8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kB:BXcwt3tRpcnuJ4
imphash f34d5f2d4577ed6d9ceec516c1f5a744
impfuzzy 3:rGsLdAIEK:tf
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
watch Creates known Bladabindi mutexes
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed

Rules (8cnts)

Level Name Description Collection
danger Win_Backdoor_njRAT_Zero Win Backdoor njRAT binaries (download)
danger Win_Backdoor_njRAT_Zero Win Backdoor njRAT binaries (upload)
info Is_DotNET_EXE (no description) binaries (download)
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

mscoree.dll
 0x402000 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure