Resubmissions

11/10/2022, 18:56

221011-xlc7msabg9 10

11/10/2022, 18:10

221011-wsd7vaggd8 1

General

  • Target

    COOL_REMOTE.exe

  • Size

    15.5MB

  • MD5

    54129cad2a0de88cd94440e7663fdffb

  • SHA1

    194c402c0d3bb285cc32eb4a6f23519081c8815e

  • SHA256

    44e38bf97ce3f5cc22886a54e1e7144e2c6fbdb9515b9a8f26f025ce3eac56e4

  • SHA512

    1767c1a87a320f587a0b97c8d25fbd069901c6c3aee88ba1318dbbfe127819ab6d65d2872468c77a91516c5dade2833bddf7028255063e3bc0216d4cdc4e4c80

  • SSDEEP

    98304:Aqiq+g5BBwz5XVmen10uOQEoTos9UyFiiMShW1WrCcSIggkI:AqfVLwzxVln1AowYI

Score
10/10

Malware Config

Signatures

  • Detects Sliver implant cross-platform adversary emulation/red team 1 IoCs

    Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army.

  • Silver family

Files

  • COOL_REMOTE.exe
    .exe windows x64

    9cbefe68f395e67356e2a5d8d1b285c0


    Headers

    Imports

    Sections