General

  • Target

    d12fb728c65e05977f5348841f2bdae746ab8f2102a6b547191a94d5f0d8239e

  • Size

    16.4MB

  • MD5

    dd3ec02d14742d3a58af3645501f7614

  • SHA1

    4c140c8ecfc8cc30e938af45fc1f029b5ca10a85

  • SHA256

    d12fb728c65e05977f5348841f2bdae746ab8f2102a6b547191a94d5f0d8239e

  • SHA512

    bf1a8702ebd0c94a7366c791e9357faaa03a488e4b727a59712d29586d653e91590e26feb2e75010d0c9481ef2b02731dfc78c5bd4259293963d520c0d7892d5

  • SSDEEP

    98304:SHLFi/GRWfKuCdModl4yA0Hz0OHkg9NyVjADJEnd2Gxa:SrFioddlRdHzjHkg9NyVjADKZa

Score
10/10

Malware Config

Signatures

  • Detects Sliver implant cross-platform adversary emulation/red team 1 IoCs

    Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army.

  • Silver family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d12fb728c65e05977f5348841f2bdae746ab8f2102a6b547191a94d5f0d8239e
    .exe windows:6 windows x64 arch:x64

    f0ea7b7844bbc5bfa9bb32efdcea957c


    Headers

    Imports

    Sections