General

  • Target

    305ecea563c841858d076490b3adfb50_NeikiAnalytics.exe

  • Size

    116KB

  • Sample

    240617-b4vczsycng

  • MD5

    305ecea563c841858d076490b3adfb50

  • SHA1

    7c5f7d072b4d70035bd58b5392e98acece6f454c

  • SHA256

    64a38c5ff1594da02d0635e30b33d05fca5ebb4771d2eb33e69a3e89ea227a1b

  • SHA512

    253b3c755c6fc2f4c16b77d7808ac3d80b502028f20e42f417d3bd10fb507db3f04014be61aa5b75e0274f875225e286d63fee453084e38dc623d2f6d1759d0a

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLJ:P5eznsjsguGDFqGZ2rDLJ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      305ecea563c841858d076490b3adfb50_NeikiAnalytics.exe

    • Size

      116KB

    • MD5

      305ecea563c841858d076490b3adfb50

    • SHA1

      7c5f7d072b4d70035bd58b5392e98acece6f454c

    • SHA256

      64a38c5ff1594da02d0635e30b33d05fca5ebb4771d2eb33e69a3e89ea227a1b

    • SHA512

      253b3c755c6fc2f4c16b77d7808ac3d80b502028f20e42f417d3bd10fb507db3f04014be61aa5b75e0274f875225e286d63fee453084e38dc623d2f6d1759d0a

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLJ:P5eznsjsguGDFqGZ2rDLJ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks