General
-
Target
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750
-
Size
46KB
-
Sample
241110-1ptwcavqd1
-
MD5
85805d0582f2ba6089e4fa5f1f15cc3e
-
SHA1
d39dbac127be08bfc857a6891eaa80fb6ef7d226
-
SHA256
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750
-
SHA512
5145d6facb073f80d649f7fb316d4d72df04d0977f3fa026a4ba30023006b59055f1f966330b5dec87be9052059f98e8dedd9a072f2a5b596c1b446543426d08
-
SSDEEP
768:q4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:JSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Behavioral task
behavioral1
Sample
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750.xls
Resource
win7-20241023-en
Malware Config
Extracted
https://194.182.164.149:8080/fontawesome.woff
Targets
-
-
Target
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750
-
Size
46KB
-
MD5
85805d0582f2ba6089e4fa5f1f15cc3e
-
SHA1
d39dbac127be08bfc857a6891eaa80fb6ef7d226
-
SHA256
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750
-
SHA512
5145d6facb073f80d649f7fb316d4d72df04d0977f3fa026a4ba30023006b59055f1f966330b5dec87be9052059f98e8dedd9a072f2a5b596c1b446543426d08
-
SSDEEP
768:q4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:JSFsv66g3KnF439NKC54kkGfn+cL2Xd+
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sliver RAT v2
-
Sliver family
-
Blocklisted process makes network request
-