General

  • Target

    ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe

  • Size

    62KB

  • Sample

    240524-t3rjtaca7y

  • MD5

    ab877ed5f1043c36b0774e405ad59f80

  • SHA1

    6a5fb16cd1d1413bfbcb2313d479896585480a0f

  • SHA256

    8824733981d29f17e304e5f610f82c8e6574d50e63fd35cc4f962cee8ff15e92

  • SHA512

    9ab8e7b09e3c486409211c697cd86855a767aca1b2e6893bc1dca9d7f5caec9e0341a1d6a095139ead9eb03c9d961729afc745ac02423cc54bf8e9f0bc36578f

  • SSDEEP

    768:b5LdNcambmjeCGrrxLYcFso4jZKQqLboxsqjGi6CU16mH4qs9BYgNmVCsrbyaWXD:RdN/C6G3xTstEzGs9TCAqH5MV7G9LsY

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

svchost

C2

spys.ddns.net:1528

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe

    • Size

      62KB

    • MD5

      ab877ed5f1043c36b0774e405ad59f80

    • SHA1

      6a5fb16cd1d1413bfbcb2313d479896585480a0f

    • SHA256

      8824733981d29f17e304e5f610f82c8e6574d50e63fd35cc4f962cee8ff15e92

    • SHA512

      9ab8e7b09e3c486409211c697cd86855a767aca1b2e6893bc1dca9d7f5caec9e0341a1d6a095139ead9eb03c9d961729afc745ac02423cc54bf8e9f0bc36578f

    • SSDEEP

      768:b5LdNcambmjeCGrrxLYcFso4jZKQqLboxsqjGi6CU16mH4qs9BYgNmVCsrbyaWXD:RdN/C6G3xTstEzGs9TCAqH5MV7G9LsY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks