General
-
Target
4ec853d9972a4da2aee5ceb0d7820b0bf419a26f0e2a90d06e9562ae80d94a31
-
Size
46KB
-
Sample
241110-1rtclawckj
-
MD5
8b242d19bd9a2b1186f4ef8de0c4ffa2
-
SHA1
ac9651800cf0296ef5f545b18eca8b72cf40c9ca
-
SHA256
4ec853d9972a4da2aee5ceb0d7820b0bf419a26f0e2a90d06e9562ae80d94a31
-
SHA512
89f4221b4eb13128f568dc118c5bf171d9d955e474fec94d8a5139af1afcd4d42a3949aeb32f151178a8168f42885ecf10b6046d68951386df8580d3f1bc565a
-
SSDEEP
768:r4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:8SFsv66g3KnF439NKC54kkGfn+cL2Xd+
Behavioral task
behavioral1
Sample
4ec853d9972a4da2aee5ceb0d7820b0bf419a26f0e2a90d06e9562ae80d94a31.xls
Resource
win7-20241010-en
Malware Config
Extracted
https://194.182.164.149:8080/fontawesome.woff
Targets
-
-
Target
4ec853d9972a4da2aee5ceb0d7820b0bf419a26f0e2a90d06e9562ae80d94a31
-
Size
46KB
-
MD5
8b242d19bd9a2b1186f4ef8de0c4ffa2
-
SHA1
ac9651800cf0296ef5f545b18eca8b72cf40c9ca
-
SHA256
4ec853d9972a4da2aee5ceb0d7820b0bf419a26f0e2a90d06e9562ae80d94a31
-
SHA512
89f4221b4eb13128f568dc118c5bf171d9d955e474fec94d8a5139af1afcd4d42a3949aeb32f151178a8168f42885ecf10b6046d68951386df8580d3f1bc565a
-
SSDEEP
768:r4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:8SFsv66g3KnF439NKC54kkGfn+cL2Xd+
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sliver RAT v2
-
Sliver family
-
Blocklisted process makes network request
-