General

  • Target

    3edc68e483c9a8dd5fa3a80f1b4f7174249b1d81b848ed09d9d34adf2d8b688f_NeikiAnalytics.exe

  • Size

    93KB

  • Sample

    240701-h2qqcayfph

  • MD5

    a15f8a7652a7a943d53879e899230380

  • SHA1

    472563bc8835823e2de69f0be250ac702e5453e9

  • SHA256

    3edc68e483c9a8dd5fa3a80f1b4f7174249b1d81b848ed09d9d34adf2d8b688f

  • SHA512

    df1c005cfacb5dd6571b8ed3145a0b553d3b9b4c20d0f19fb4f3993b851f48eaefa973d20f13ddf0a496b7062c9538215697ad6a24194e62494682c68217208f

  • SSDEEP

    1536:PUwC+xhUa9urgOBPRNvM4jEwzGi1dDLDkgS:PUmUa9urgObdGi1d7d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

zi01.ddns.net:5552

Mutex

8dc22d2dd06ffecf9d86a3b7f0a263e0

Attributes
  • reg_key

    8dc22d2dd06ffecf9d86a3b7f0a263e0

  • splitter

    |'|'|

Targets

    • Target

      3edc68e483c9a8dd5fa3a80f1b4f7174249b1d81b848ed09d9d34adf2d8b688f_NeikiAnalytics.exe

    • Size

      93KB

    • MD5

      a15f8a7652a7a943d53879e899230380

    • SHA1

      472563bc8835823e2de69f0be250ac702e5453e9

    • SHA256

      3edc68e483c9a8dd5fa3a80f1b4f7174249b1d81b848ed09d9d34adf2d8b688f

    • SHA512

      df1c005cfacb5dd6571b8ed3145a0b553d3b9b4c20d0f19fb4f3993b851f48eaefa973d20f13ddf0a496b7062c9538215697ad6a24194e62494682c68217208f

    • SSDEEP

      1536:PUwC+xhUa9urgOBPRNvM4jEwzGi1dDLDkgS:PUmUa9urgObdGi1d7d

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Tasks