General
-
Target
Sigmanly_b37508a2880228db684f461822c955304158e1e4bf210ebb4892466d81d5941c
-
Size
27KB
-
Sample
250326-pf3w4s1pt4
-
MD5
2c4fe940c0aaf722b86f2784c09b65a7
-
SHA1
6260d732f353cff21ec5f131295f169cf07f111e
-
SHA256
b37508a2880228db684f461822c955304158e1e4bf210ebb4892466d81d5941c
-
SHA512
b15b40035bffea1e285874817a302cbeeecfe1adebabab5ee978c8194175bf74aeba5c35474e0217cbfd1f8dd5ef25e9a3ea64ba51b1732be07db13b30296f3f
-
SSDEEP
384:mL9QKJ3buZjmgERA4MDwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhca6:AaK5buQE4MfLFA/vMHTi9bD
Behavioral task
behavioral1
Sample
Sigmanly_b37508a2880228db684f461822c955304158e1e4bf210ebb4892466d81d5941c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Sigmanly_b37508a2880228db684f461822c955304158e1e4bf210ebb4892466d81d5941c.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
v2.0
HacKed
46.153.249.193:443
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
Sigmanly_b37508a2880228db684f461822c955304158e1e4bf210ebb4892466d81d5941c
-
Size
27KB
-
MD5
2c4fe940c0aaf722b86f2784c09b65a7
-
SHA1
6260d732f353cff21ec5f131295f169cf07f111e
-
SHA256
b37508a2880228db684f461822c955304158e1e4bf210ebb4892466d81d5941c
-
SHA512
b15b40035bffea1e285874817a302cbeeecfe1adebabab5ee978c8194175bf74aeba5c35474e0217cbfd1f8dd5ef25e9a3ea64ba51b1732be07db13b30296f3f
-
SSDEEP
384:mL9QKJ3buZjmgERA4MDwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhca6:AaK5buQE4MfLFA/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1