General

  • Target

    Sleezy Perm Spoofer.exe

  • Size

    37KB

  • Sample

    240929-nk9d1swbmd

  • MD5

    169ca703920e9eeaae4c118538493a3e

  • SHA1

    21f069559e4b606423b587b7d8ddd54a8eb0cbd2

  • SHA256

    3f59444186757a488078438ecc19c6f8e37e14e682d2ceda2c65582ab731f3eb

  • SHA512

    bcdb446ecb9aa4f902f0383005acfd08029301c6c1da19835e79763953ae9c600e0ed80e4c67bf27cb9b1785613fef561278e93aa79f57198dbb0a556aa0eeca

  • SSDEEP

    384:P+QnVSikm70NVtv/Vey0bM50vtEsuq/aZrAF+rMRTyN/0L+EcoinblneHQM3epz+:mo/O1VV0bMuWlqMrM+rMRa8NuaXt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Sleezy

C2

2.tcp.eu.ngrok.io:10394

Mutex

5f55366198fbf5f44b30c59e431ef9cc

Attributes
  • reg_key

    5f55366198fbf5f44b30c59e431ef9cc

  • splitter

    |'|'|

Targets

    • Target

      Sleezy Perm Spoofer.exe

    • Size

      37KB

    • MD5

      169ca703920e9eeaae4c118538493a3e

    • SHA1

      21f069559e4b606423b587b7d8ddd54a8eb0cbd2

    • SHA256

      3f59444186757a488078438ecc19c6f8e37e14e682d2ceda2c65582ab731f3eb

    • SHA512

      bcdb446ecb9aa4f902f0383005acfd08029301c6c1da19835e79763953ae9c600e0ed80e4c67bf27cb9b1785613fef561278e93aa79f57198dbb0a556aa0eeca

    • SSDEEP

      384:P+QnVSikm70NVtv/Vey0bM50vtEsuq/aZrAF+rMRTyN/0L+EcoinblneHQM3epz+:mo/O1VV0bMuWlqMrM+rMRa8NuaXt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks