General

  • Target

    dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3

  • Size

    46KB

  • Sample

    241111-z55gcaxbjc

  • MD5

    e97afc97d2da6d145efc00d210d60e4c

  • SHA1

    59475d809d54df8e563c497fdf3906ad6e59a1bb

  • SHA256

    dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3

  • SHA512

    cf560e0642b4b2b57ec20a0015d7efbb2e0d4246e542150ad46f6947996a5e3d2488e2dac99fce428a84cd18270a4e8d2ee12c7848813745a47f4a0591375584

  • SSDEEP

    768:H4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:YSFsv66g3KnF439NKC54kkGfn+cL2Xd+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://194.182.164.149:8080/fontawesome.woff

Targets

    • Target

      dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3

    • Size

      46KB

    • MD5

      e97afc97d2da6d145efc00d210d60e4c

    • SHA1

      59475d809d54df8e563c497fdf3906ad6e59a1bb

    • SHA256

      dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3

    • SHA512

      cf560e0642b4b2b57ec20a0015d7efbb2e0d4246e542150ad46f6947996a5e3d2488e2dac99fce428a84cd18270a4e8d2ee12c7848813745a47f4a0591375584

    • SSDEEP

      768:H4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:YSFsv66g3KnF439NKC54kkGfn+cL2Xd+

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Sliver RAT v2

    • Sliver family

    • SliverRAT

      SliverRAT is an open source Adversary Emulation Framework.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks