Task Information
| Task ID: | c448e237-c66c-11f0-adeb-42010aa4000b |
| File name: | 1383b15eb40ca1c7264b1c9e555b1def |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CN_disclosed_20180208_c
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects malware from disclosed CN malware set |
| Reference: | https://twitter.com/cyberintproject/status/961714165550342146 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | CN_disclosed_20180208_c_RID2E71
|
| Author: | Florian Roth |
| Description: | Detects malware from disclosed CN malware set |
| Reference: | https://twitter.com/cyberintproject/status/961714165550342146 |
| TLP: | TLP:WHITE |
| Rule name: | Disable_Defender
|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | Mal_WIN_NjRAT_RAT_PE
|
| Author: | Phatcharadol Thangplub |
| Description: | Use to detect NjRAT implant. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | MAL_Winnti_Sample_May18_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects malware sample from Burning Umbrella report - Generic Winnti Rule |
| Reference: | https://401trg.pw/burning-umbrella/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | MAL_Winnti_Sample_May18_1_RID3003
|
| Author: | Florian Roth |
| Description: | Detects malware sample from Burning Umbrella report - Generic Winnti Rule |
| Reference: | https://401trg.pw/burning-umbrella/ |
| TLP: | TLP:WHITE |
| Rule name: | malware_Njrat_strings
|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect njRAT in memory |
| TLP: | TLP:WHITE |
| Repository: | JPCERTCC |
| Rule name: | MALWARE_Win_NjRAT
|
| Author: | ditekSHen |
| Description: | Detects NjRAT / Bladabindi / NjRAT Golden |
| TLP: | TLP:WHITE |
| Repository: | diˈtekSHən |
| Rule name: | Multifamily_RAT_Detection
|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | Njrat
|
| Author: | botherder https://github.com/botherder |
| Description: | Njrat |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | Njrat
|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect njRAT in memory |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | Sus_CMD_Powershell_Usage
|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Unknown_Malware_Sample_Jul17_2
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects unknown malware sample with pastebin RAW URL |
| Reference: | https://goo.gl/iqH8CK |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | win_njrat_w1
|
| Author: | Brian Wallace @botnet_hunter <bwall@ballastsecurity.net> |
| Description: | Identify njRat |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | classified |
| Author: | classified |
| Description: | classified |
| TLP : | TLP:AMBER |
| Rule name: | classified |
| Author: | classified |
| Description: | classified |
| TLP : | TLP:AMBER |
| Rule name: | classified |
| Author: | classified |
| Description: | classified |
| TLP : | TLP:AMBER |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter