General

  • Target

    Sleezy Perm Spoofer.exe

  • Size

    37KB

  • MD5

    169ca703920e9eeaae4c118538493a3e

  • SHA1

    21f069559e4b606423b587b7d8ddd54a8eb0cbd2

  • SHA256

    3f59444186757a488078438ecc19c6f8e37e14e682d2ceda2c65582ab731f3eb

  • SHA512

    bcdb446ecb9aa4f902f0383005acfd08029301c6c1da19835e79763953ae9c600e0ed80e4c67bf27cb9b1785613fef561278e93aa79f57198dbb0a556aa0eeca

  • SSDEEP

    384:P+QnVSikm70NVtv/Vey0bM50vtEsuq/aZrAF+rMRTyN/0L+EcoinblneHQM3epz+:mo/O1VV0bMuWlqMrM+rMRa8NuaXt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Sleezy

C2

2.tcp.eu.ngrok.io:10394

Mutex

5f55366198fbf5f44b30c59e431ef9cc

Attributes
  • reg_key

    5f55366198fbf5f44b30c59e431ef9cc

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Sleezy Perm Spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections