Sliver C2 Implant Analysis

Michael Koczwara
8 min readJan 12, 2023

Sliver C2 Implant Analysis

C2 server

Intro

In this short blog, I will analyse a sample of Sliver that I was able to identify while scanning my adversaries’ infrastructure. I will start with a static analysis with PEStudio, a dynamic analysis with ProcMon and Wireshark. I will perform some basic reverse engineering with IDA and finally analyse the Threat Actor infrastructure.

--

--