General
-
Target
3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3.hta
-
Size
3KB
-
Sample
241107-crt25askhx
-
MD5
f46e78d3864aae68f2b8e83af27b9cf3
-
SHA1
51d75c93a4d06327f172d41c797ecc99a8ba309a
-
SHA256
3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3
-
SHA512
e714e39827ebe83e3c5e31bbd780d2909318a1bfaf2017476ee137b87ddf417ef0d0f933844c3140c2f276601658ad81e51718eb01286641504cdc0fb9d9662c
Static task
static1
Behavioral task
behavioral1
Sample
3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3.hta
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3.hta
-
Size
3KB
-
MD5
f46e78d3864aae68f2b8e83af27b9cf3
-
SHA1
51d75c93a4d06327f172d41c797ecc99a8ba309a
-
SHA256
3a4befeda808fff4c4bef7d488d59fefa1334d9c7acb6cb155c6cfa9f88a03f3
-
SHA512
e714e39827ebe83e3c5e31bbd780d2909318a1bfaf2017476ee137b87ddf417ef0d0f933844c3140c2f276601658ad81e51718eb01286641504cdc0fb9d9662c
-
Sliver RAT v2
-
Sliver family
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-