download: | /simalei/njRAT/releases/download/v0.7D/NjRat.0.7D.Danger.Edition.zip |
Full analysis: | https://app.any.run/tasks/6cebc6e4-af22-494b-9729-83786782ecdd |
Verdict: | Malicious activity |
Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
Analysis date: | January 01, 2024, 11:16:20 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 18B9E23E509FF221EBB1B8A0CE4BC82B |
SHA1: | BACAB6A415515E94B3083C4F7EBDA6A82E1D4C7F |
SHA256: | 4B649C32035E383706673FFE6471D6C711989A206D6F96FDD905DDA207A5F0CB |
SSDEEP: | 393216:miHDYl/45B6Jh6jtGFHAeFWs2AUSTPnUGeOiw6hlVoTzQaGQLMGqE5i:DYl/4r3g6C1UGGw6hlZrQLTqSi |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | - |
ZipCompression: | None |
ZipModifyDate: | 2020:10:23 14:50:06 |
ZipCRC: | 0x00000000 |
ZipCompressedSize: | - |
ZipUncompressedSize: | - |
ZipFileName: | ER/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
128 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\NjRat.0.7D.Danger.Edition.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
584 | "C:\Users\admin\Desktop\NjRat 0.7D Danger Edition.exe" | C:\Users\admin\Desktop\NjRat 0.7D Danger Edition.exe | explorer.exe | ||||||||||||
User: admin Company: CTRIK BY Fransesco Integrity Level: HIGH Description: CTRIK BY Fransesco Exit code: 0 Version: 0.0.0.7 Modules
| |||||||||||||||
1812 | netsh firewall add allowedprogram "C:\Users\admin\Desktop\Server.exe" "Server.exe" ENABLE | C:\Windows\System32\netsh.exe | — | Server.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2808 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe" /alignment=512 /QUIET "C:\Users\admin\AppData\Local\Temp\stub.il" /output:"C:\Users\admin\Desktop\Server.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe | — | NjRat 0.7D Danger Edition.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft .NET Framework IL assembler Exit code: 0 Version: 2.0.50727.5483 (Win7SP1GDR.050727-5400) Modules
| |||||||||||||||
2884 | "C:\Users\admin\Desktop\Server.exe" | C:\Users\admin\Desktop\Server.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
NjRat(PID) Process(2884) Server.exe C2127.0.0.1 Ports5552 BotnetHacKed Options Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\defdb9704043a1f0f9a4a4d56b063e7b Splitter|'|'| Version0.7d | |||||||||||||||
3016 | "C:\Users\admin\AppData\Local\Temp\tmpFFAF.tmp.bat" | C:\Users\admin\AppData\Local\Temp\tmpFFAF.tmp.bat | — | Server.exe | |||||||||||
User: admin Company: Microsoft Integrity Level: HIGH Description: Andex Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
3128 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\tempxxSD.bat" " | C:\Windows\System32\cmd.exe | — | Server.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3212 | "C:\Users\admin\AppData\Local\Temp\tmp6918.tmp.bat" | C:\Users\admin\AppData\Local\Temp\tmp6918.tmp.bat | — | Server.exe | |||||||||||
User: admin Company: Microsoft Integrity Level: HIGH Description: Andex Exit code: 0 Version: 1.0.0.0 Modules
|
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (128) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\User.dll | text | |
MD5:456C3E1669D900EBE41355349DEB28E0 | SHA256:E4125F396993EA0876F3FFA9BFFC46134DD20D7C8E4D077DDADEE67B6CA33ABE | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\Delettemp.dll | text | |
MD5:5FCE1E96BF39CD18EDE1C35B48A90B43 | SHA256:5CBEA0F270BC1D57E2231A4D2D5E5D8323710D5757E714D5559E90DC86432C93 | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\laxer.dll | text | |
MD5:E67EE9FA20340544E65BC2CFBA5D8192 | SHA256:21AB187279045E81F550C170FDC8B73117F4E4DC2E608BDB80865540264FDAB6 | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\Abrairnotes.dll | text | |
MD5:CAD085EB4A51B05D3F2905C9A2996FEC | SHA256:321FCF894E5A1853FFB430624D3085F04025563E8E5D8AE1C9C28DBCE93D5F93 | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\Abrier.dll | text | |
MD5:5514B7E5A95E10C6D37278BB973651B2 | SHA256:ED0AA6ECBB2D5D6EF3B8431D13D4562D89C2E1C88636C22DBBBBEA81E32F913D | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\Apraircam.dll | text | |
MD5:CC795C9C4A83AA1EDE067F96F1EB8D15 | SHA256:37D23694738615464BE8A3234BCC59592987432C8863DB67E30385B8BB3EF450 | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\Bipe.dll | text | |
MD5:4992E2814A8597FB20B5282E568A032D | SHA256:C1C8AFDE84694F203EBB49766454CE17179E32C06A0BBDD272BF598C0D9B7C0E | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\maltExe.dll | text | |
MD5:94070806E01C1AE7FE2AAE46D929387A | SHA256:4F553023C9FDFEA5F806C86D6BDD40D94348843D4A4EFD91DC952A53229A4358 | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\trafs.dll | text | |
MD5:08C12660D57FB1679A2A881FFEA7A929 | SHA256:FC41E3B41DFE50D5CA916EE4800A122DA3744754E6BC16F7AEB8DBFCDB48862E | |||
128 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa128.29029\ER\logoff.dll | text | |
MD5:3D79995C5AF417FB5B26F78B02000F49 | SHA256:2036A894B2C0EAEB684A56B5DA1E2BBF992FF50FBA536E606FB1ADADF6CDEC4C |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |