General

  • Target

    44fb09efceb3e81150181ad3ecbeed20_NeikiAnalytics.exe

  • Size

    23KB

  • Sample

    240618-pl6j7axepp

  • MD5

    44fb09efceb3e81150181ad3ecbeed20

  • SHA1

    512d19f550c4115e05b4255ac773f0c2189154e4

  • SHA256

    4fcd6f2fc384fccc0040ad53e9c7b53ad99f00307f048c78a89dfac7edc08501

  • SHA512

    69d1e2a3b18dcd9d8d4a901aac098caaefdddc2ed40a63aaaa94e4ac1a86d7fe5ced69c964f974410079e2d91deea13fdf54cbdba89e4c3ae952aea1902916d3

  • SSDEEP

    384:eoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIC:R7O89p2rRpcnug

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      44fb09efceb3e81150181ad3ecbeed20_NeikiAnalytics.exe

    • Size

      23KB

    • MD5

      44fb09efceb3e81150181ad3ecbeed20

    • SHA1

      512d19f550c4115e05b4255ac773f0c2189154e4

    • SHA256

      4fcd6f2fc384fccc0040ad53e9c7b53ad99f00307f048c78a89dfac7edc08501

    • SHA512

      69d1e2a3b18dcd9d8d4a901aac098caaefdddc2ed40a63aaaa94e4ac1a86d7fe5ced69c964f974410079e2d91deea13fdf54cbdba89e4c3ae952aea1902916d3

    • SSDEEP

      384:eoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIC:R7O89p2rRpcnug

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks