General

  • Target

    f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk

  • Size

    1KB

  • Sample

    241129-exvxqa1kbj

  • MD5

    95bfcc2eac48c76681aa2d97a5674201

  • SHA1

    f72d50b2bba6e479ec106ae2f6fe993ab6eef99a

  • SHA256

    f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478

  • SHA512

    952485dbd0096257ab62ef2fa684d1333fa1e495ad29d8e7a8aaa41d6b316abb48ca5ad2c1b704db7e5bc346a8350039a059c7d5ad323b072ecd3911ac4c5925

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://0day.works/a

Targets

    • Target

      f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk

    • Size

      1KB

    • MD5

      95bfcc2eac48c76681aa2d97a5674201

    • SHA1

      f72d50b2bba6e479ec106ae2f6fe993ab6eef99a

    • SHA256

      f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478

    • SHA512

      952485dbd0096257ab62ef2fa684d1333fa1e495ad29d8e7a8aaa41d6b316abb48ca5ad2c1b704db7e5bc346a8350039a059c7d5ad323b072ecd3911ac4c5925

    Score
    10/10
    • Sliver RAT v2

    • Sliver family

    • SliverRAT

      SliverRAT is an open source Adversary Emulation Framework.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks