General

  • Target

    208992fff94e0cf721fa83b114d00bf0_NeikiAnalytics.exe

  • Size

    31KB

  • Sample

    240527-f57rxshf3x

  • MD5

    208992fff94e0cf721fa83b114d00bf0

  • SHA1

    0d8a8f706504b372d8ab97a94794297a63ea086c

  • SHA256

    152c1bfa242de3f54aba5421b69c20d50bbd40c4cb536c2f2d67c1c150e1e8dc

  • SHA512

    11ea5d2f118bed146343a154027288a2ad6f70f844ba2a03a8674eec1756e820cd9401dc488b5ef8bc2922ca67ac5ff4bd400ac788cad151034573a2f99cfb57

  • SSDEEP

    768:EPorDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tijwj:Jw68nQbkQVkBj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

192.168.1.7:8964

Mutex

542af4008a1edcf83bf4d172e7d550ac

Attributes
  • reg_key

    542af4008a1edcf83bf4d172e7d550ac

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      208992fff94e0cf721fa83b114d00bf0_NeikiAnalytics.exe

    • Size

      31KB

    • MD5

      208992fff94e0cf721fa83b114d00bf0

    • SHA1

      0d8a8f706504b372d8ab97a94794297a63ea086c

    • SHA256

      152c1bfa242de3f54aba5421b69c20d50bbd40c4cb536c2f2d67c1c150e1e8dc

    • SHA512

      11ea5d2f118bed146343a154027288a2ad6f70f844ba2a03a8674eec1756e820cd9401dc488b5ef8bc2922ca67ac5ff4bd400ac788cad151034573a2f99cfb57

    • SSDEEP

      768:EPorDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tijwj:Jw68nQbkQVkBj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks