General

  • Target

    4f2af0c255560149cb6eb1b2726fa15e655d229f2fcf4b96116a68e3ec59b00b_NeikiAnalytics.exe

  • Size

    93KB

  • Sample

    240701-ns3lfasgkk

  • MD5

    ad728ad5539c5af474b79fda2f015c40

  • SHA1

    16b131079b93fdefc0d29c813c975ede496c65d2

  • SHA256

    4f2af0c255560149cb6eb1b2726fa15e655d229f2fcf4b96116a68e3ec59b00b

  • SHA512

    d239481f83137159fb34fbfdd83dd60107ca362789d0843c60f903a2aceb64b42e0a9fedd87236e40e685baac64b5d54b5b087165bfec2500795a057c6aac1a7

  • SSDEEP

    768:xY3zKBD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3tsG9:0KzOx6baIa9RPj00ljEwzGi1dD9DJgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

58545cc3d8c7a250b6c898ea8af2bde3

Attributes
  • reg_key

    58545cc3d8c7a250b6c898ea8af2bde3

  • splitter

    |'|'|

Targets

    • Target

      4f2af0c255560149cb6eb1b2726fa15e655d229f2fcf4b96116a68e3ec59b00b_NeikiAnalytics.exe

    • Size

      93KB

    • MD5

      ad728ad5539c5af474b79fda2f015c40

    • SHA1

      16b131079b93fdefc0d29c813c975ede496c65d2

    • SHA256

      4f2af0c255560149cb6eb1b2726fa15e655d229f2fcf4b96116a68e3ec59b00b

    • SHA512

      d239481f83137159fb34fbfdd83dd60107ca362789d0843c60f903a2aceb64b42e0a9fedd87236e40e685baac64b5d54b5b087165bfec2500795a057c6aac1a7

    • SSDEEP

      768:xY3zKBD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3tsG9:0KzOx6baIa9RPj00ljEwzGi1dD9DJgS

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks