General

  • Target

    cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60

  • Size

    46KB

  • Sample

    241111-z88ceaxbnh

  • MD5

    cdacbcc06043403546aee2076b84a864

  • SHA1

    0419744d77b7216c780b3ef2782c7c45280b5d8e

  • SHA256

    cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60

  • SHA512

    07c6eceac262cd2f226f370d7a17fb0e5a25b2b790502f5adc39fd57547c02b1cf8796ca6de199425025882e77a58bc5672b4163606a74706e905ba44206db08

  • SSDEEP

    768:54SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:mSFsv66g3KnF439NKC54kkGfn+cL2Xd+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://194.182.164.149:8080/fontawesome.woff

Targets

    • Target

      cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60

    • Size

      46KB

    • MD5

      cdacbcc06043403546aee2076b84a864

    • SHA1

      0419744d77b7216c780b3ef2782c7c45280b5d8e

    • SHA256

      cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60

    • SHA512

      07c6eceac262cd2f226f370d7a17fb0e5a25b2b790502f5adc39fd57547c02b1cf8796ca6de199425025882e77a58bc5672b4163606a74706e905ba44206db08

    • SSDEEP

      768:54SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:mSFsv66g3KnF439NKC54kkGfn+cL2Xd+

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Sliver RAT v2

    • Sliver family

    • SliverRAT

      SliverRAT is an open source Adversary Emulation Framework.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks