Sample name: | 5cPRapVOx6.dllrenamed because original name is a hash value |
Original sample name: | c994bb9982dd689598c6c261090a40cb.dll |
Analysis ID: | 1520451 |
MD5: | c994bb9982dd689598c6c261090a40cb |
SHA1: | 484932042beb27bec5ab6d96df21ec1418c428a6 |
SHA256: | fbce9fc010fdfb67da5ff95cc5a5d1dbb0c07950522f130b031e55831f81b060 |
Tags: | dlluser-abuse_ch |
Infos: | |
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Sliver | According to VK9 Seecurity, Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army. | No Attribution |
|
AV Detection |
---|
Source: |
ReversingLabs: |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
Network Connect: |
Jump to behavior |
Source: |
String found in binary or memory: |