NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash de6e84b013a1013e478b251465ba9a121d3dfa6e10d18fd042f49dedbff0ba23.

Scan Results


SHA256 hash: de6e84b013a1013e478b251465ba9a121d3dfa6e10d18fd042f49dedbff0ba23
File size:24'064 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 722c1462243b261cef5621dca8947b51
SHA1 hash: f3f9f17f68384eb52e440fa12f2fa1cf1b0fc46e
SHA3-384 hash: ac780818858d6f7d0eb6c9289e9911ee5d06bbe2b6c8649c896ef49023fc8a7791ea3942344650cf1c4e5c491ded4351
First seen:2025-04-03 02:34:15 UTC
Last seen:Never
Sightings:1
imphash : f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep : 384:M8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZpo:bXcwt3tRpcnuZ
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:22f8ca46-1034-11f0-b4a6-42010aa4000b
File name:722c1462243b261cef5621dca8947b51
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.Nanocore-10030076-0
Signature:Win.Dropper.njRAT-10015886-0
Signature:Win.Packed.Bladabindi-6804148-0
Signature:Win.Packed.Bladabindi-6917466-0
Signature:Win.Packed.Generic-9795615-0
Signature:Win.Packed.Generic-9795616-0
Signature:Win.Trojan.B-468
Signature:Win.Trojan.Bladabindi-6192388-0
Signature:Win.Trojan.Generic-6417450-0
Signature:Win.Trojan.Generic-6454614-0
Signature:Win.Trojan.Generic-6454615-0
Signature:Win.Trojan.Ratenjay-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CN_disclosed_20180208_c
Author:Florian Roth (Nextron Systems)
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:CN_disclosed_20180208_c_RID2E71
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
TLP:TLP:WHITE
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:MAL_njrat
Author:SECUINFRA Falcon Team
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:malware_Njrat_strings
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:MALWARE_Win_NjRAT
Author:ditekSHen
Description:Detects NjRAT / Bladabindi / NjRAT Golden
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
TLP:TLP:WHITE
Repository:
Rule name:pe_imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Skystars_LightDefender_Njrat_Rule
Author:Skystars LightDefender
Description:Detects Njrat
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:SUSP_netsh_firewall_command
Author:SECUINFRA Falcon Team
TLP:TLP:WHITE
Rule name:win_njrat_bytecodes_oct_2023
Author:Matthew @ Embee_Research
TLP:TLP:WHITE
Repository:embee-research
Rule name:classified
Author:classified
TLP :TLP:GREEN
Rule name:win_njrat_strings_oct_2023
Author:Matthew @ Embee_Research
TLP:TLP:WHITE
Repository:embee-research
Rule name:win_njrat_w1
Author:Brian Wallace @botnet_hunter <bwall@ballastsecurity.net>
Description:Identify njRat
TLP:TLP:WHITE
Repository:Malpedia
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:Windows_Trojan_Njrat_30f3c220
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Njrat_30f3c220
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.