General
-
Target
dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578
-
Size
46KB
-
Sample
241110-z2xx4avfll
-
MD5
a26cd351baea6159ea1979a56dad21db
-
SHA1
83ef2c3be02025d90d4d443cf3fe1fc84277fcb2
-
SHA256
dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578
-
SHA512
f42fe4fc3e7be31638c602ced0c9611a4f182f9f5bad82234d0df9872a58db5fd6980855237ca6078eabf90a6e2208f945d94442619a54fd7577d25c05700eb2
-
SSDEEP
768:D4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:ESFsv66g3KnF439NKC54kkGfn+cL2Xd+
Behavioral task
behavioral1
Sample
dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578.xls
Resource
win7-20241010-en
Malware Config
Extracted
https://194.182.164.149:8080/fontawesome.woff
Targets
-
-
Target
dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578
-
Size
46KB
-
MD5
a26cd351baea6159ea1979a56dad21db
-
SHA1
83ef2c3be02025d90d4d443cf3fe1fc84277fcb2
-
SHA256
dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578
-
SHA512
f42fe4fc3e7be31638c602ced0c9611a4f182f9f5bad82234d0df9872a58db5fd6980855237ca6078eabf90a6e2208f945d94442619a54fd7577d25c05700eb2
-
SSDEEP
768:D4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:ESFsv66g3KnF439NKC54kkGfn+cL2Xd+
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sliver RAT v2
-
Sliver family
-
Blocklisted process makes network request
-