NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 38b680b79a0d33f0abf047eb70a8116992040200bce56ebfc4e26043fd46b3c2.

Scan Results


SHA256 hash: 38b680b79a0d33f0abf047eb70a8116992040200bce56ebfc4e26043fd46b3c2
File size:24'064 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 5471b9ce9c4bee978d47e46b1ee1a896
SHA1 hash: 3603ac0aed914350e08043d20be68d1716bcb95c
SHA3-384 hash: 9578135b16dedce06491915f9c25f423d271a5f4e75d55a0eb948537e1406ef2e1dc717c57f2157fb71a0ae7b9c41aab
First seen:2025-04-03 02:33:14 UTC
Last seen:Never
Sightings:1
imphash : f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep : 384:PoWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIl:o7O89pbrRpcnuT
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:fe830504-1033-11f0-b4a6-42010aa4000b
File name:5471b9ce9c4bee978d47e46b1ee1a896
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.Nanocore-10030076-0
Signature:Win.Dropper.njRAT-10015886-0
Signature:Win.Packed.Bladabindi-6804148-0
Signature:Win.Packed.Bladabindi-6917466-0
Signature:Win.Packed.Generic-9795615-0
Signature:Win.Packed.Generic-9795616-0
Signature:Win.Trojan.B-468
Signature:Win.Trojan.Bladabindi-6192388-0
Signature:Win.Trojan.Generic-6417450-0
Signature:Win.Trojan.Generic-6454614-0
Signature:Win.Trojan.Generic-6454615-0
Signature:Win.Trojan.Ratenjay-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CN_disclosed_20180208_c
Author:Florian Roth (Nextron Systems)
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:CN_disclosed_20180208_c_RID2E71
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
TLP:TLP:WHITE
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:MAL_njrat
Author:SECUINFRA Falcon Team
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:malware_Njrat_strings
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:MALWARE_Win_NjRAT
Author:ditekSHen
Description:Detects NjRAT / Bladabindi / NjRAT Golden
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
TLP:TLP:WHITE
Repository:
Rule name:pe_imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Skystars_LightDefender_Njrat_Rule
Author:Skystars LightDefender
Description:Detects Njrat
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:SUSP_netsh_firewall_command
Author:SECUINFRA Falcon Team
TLP:TLP:WHITE
Rule name:win_njrat_bytecodes_oct_2023
Author:Matthew @ Embee_Research
TLP:TLP:WHITE
Repository:embee-research
Rule name:classified
Author:classified
TLP :TLP:GREEN
Rule name:win_njrat_strings_oct_2023
Author:Matthew @ Embee_Research
TLP:TLP:WHITE
Repository:embee-research
Rule name:win_njrat_w1
Author:Brian Wallace @botnet_hunter <bwall@ballastsecurity.net>
Description:Identify njRat
TLP:TLP:WHITE
Repository:Malpedia
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:Windows_Trojan_Njrat_30f3c220
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Njrat_30f3c220
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.