General

  • Target

    57332dd2990412c36e6bbec8105a5170_NeikiAnalytics.exe

  • Size

    863KB

  • Sample

    240526-de23msdb65

  • MD5

    57332dd2990412c36e6bbec8105a5170

  • SHA1

    1fa1d2d628e437c403a26d69691f0232e0638eb3

  • SHA256

    2df06e36c5ad2a9beb07314aeb097840f3bf23ff9ac446e6f20d8cab6af61623

  • SHA512

    9d466327e39082706fc19dae9567e142c1d09f6105c0dd419523a0a739dbf567b005ac1e4c946a660e71ae11a7bf0e0ae73c9399d9ca7b943589c3e9a1b62507

  • SSDEEP

    12288:a4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgaT7mWwq9MmCS:a4lavt0LkLL9IMixoEgea//wq9MmCS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      57332dd2990412c36e6bbec8105a5170_NeikiAnalytics.exe

    • Size

      863KB

    • MD5

      57332dd2990412c36e6bbec8105a5170

    • SHA1

      1fa1d2d628e437c403a26d69691f0232e0638eb3

    • SHA256

      2df06e36c5ad2a9beb07314aeb097840f3bf23ff9ac446e6f20d8cab6af61623

    • SHA512

      9d466327e39082706fc19dae9567e142c1d09f6105c0dd419523a0a739dbf567b005ac1e4c946a660e71ae11a7bf0e0ae73c9399d9ca7b943589c3e9a1b62507

    • SSDEEP

      12288:a4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgaT7mWwq9MmCS:a4lavt0LkLL9IMixoEgea//wq9MmCS

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks