General
-
Target
1744153442574b3f301c5d8bcd802c22852ac87a80a9f315e7e4e50e5ecdd62b
-
Size
46KB
-
Sample
241110-1lvcpsvpfy
-
MD5
9d4d6a868e20ae3090b0a97ebe51b5ce
-
SHA1
a40170979f8e1dff1b0a20001242bd024071fe4c
-
SHA256
1744153442574b3f301c5d8bcd802c22852ac87a80a9f315e7e4e50e5ecdd62b
-
SHA512
e9aac651935d38486fc6881d877552ed30de12bdbcde9201ae2cd6dbad1eb17b6c49e6c7300522606b3d3cfd2073e80e5a80c19d6360c05e13dcba59b4be29a7
-
SSDEEP
768:34SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:ISFsv66g3KnF439NKC54kkGfn+cL2Xd+
Behavioral task
behavioral1
Sample
1744153442574b3f301c5d8bcd802c22852ac87a80a9f315e7e4e50e5ecdd62b.xls
Resource
win7-20241010-en
Malware Config
Extracted
https://194.182.164.149:8080/fontawesome.woff
Targets
-
-
Target
1744153442574b3f301c5d8bcd802c22852ac87a80a9f315e7e4e50e5ecdd62b
-
Size
46KB
-
MD5
9d4d6a868e20ae3090b0a97ebe51b5ce
-
SHA1
a40170979f8e1dff1b0a20001242bd024071fe4c
-
SHA256
1744153442574b3f301c5d8bcd802c22852ac87a80a9f315e7e4e50e5ecdd62b
-
SHA512
e9aac651935d38486fc6881d877552ed30de12bdbcde9201ae2cd6dbad1eb17b6c49e6c7300522606b3d3cfd2073e80e5a80c19d6360c05e13dcba59b4be29a7
-
SSDEEP
768:34SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:ISFsv66g3KnF439NKC54kkGfn+cL2Xd+
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sliver RAT v2
-
Sliver family
-
Blocklisted process makes network request
-