General
-
Target
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527
-
Size
46KB
-
Sample
241111-1rsq3axfla
-
MD5
20118dff69247ba2005af86a2d37c4a5
-
SHA1
a17d3a00fcbc2c7d88f9d351bc6a03efd3a3e867
-
SHA256
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527
-
SHA512
60763b30fbba621f581a2b470f40a7d6d45755e4c661c80d4b1fd845fc5441203c9e2bf51ff62bd7e6086d0650ccee72614b32b09ad14731f2b4626d182c49c8
-
SSDEEP
768:b4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:sSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Behavioral task
behavioral1
Sample
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527.xls
Resource
win7-20240903-en
Malware Config
Extracted
https://194.182.164.149:8080/fontawesome.woff
Targets
-
-
Target
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527
-
Size
46KB
-
MD5
20118dff69247ba2005af86a2d37c4a5
-
SHA1
a17d3a00fcbc2c7d88f9d351bc6a03efd3a3e867
-
SHA256
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527
-
SHA512
60763b30fbba621f581a2b470f40a7d6d45755e4c661c80d4b1fd845fc5441203c9e2bf51ff62bd7e6086d0650ccee72614b32b09ad14731f2b4626d182c49c8
-
SSDEEP
768:b4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:sSFsv66g3KnF439NKC54kkGfn+cL2Xd+
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sliver RAT v2
-
Sliver family
-
Blocklisted process makes network request
-