Malware Analysis Report

2024-09-11 08:45

Sample ID 240421-s5q6dseg6s
Target slinkyloader.exe
SHA256 da63b969039a65aa38a43a0db322d08210f5feff8dea04c86623e5c0190c4cc8
Tags
redline sectoprat cheat infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

da63b969039a65aa38a43a0db322d08210f5feff8dea04c86623e5c0190c4cc8

Threat Level: Known bad

The file slinkyloader.exe was found to be: Known bad.

Malicious Activity Summary

redline sectoprat cheat infostealer rat trojan

RedLine payload

SectopRAT

RedLine

SectopRAT payload

Sectoprat family

Executes dropped EXE

Checks computer location settings

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-21 15:42

Signatures

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-21 15:42

Reported

2024-04-21 15:48

Platform

win11-20240412-en

Max time kernel

289s

Max time network

298s

Command Line

"C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe

"C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe"

C:\Users\Admin\AppData\Local\Temp\build.exe

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 month-washer.gl.at.ply.gg udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp

Files

memory/2352-0-0x00007FFC94D10000-0x00007FFC957D2000-memory.dmp

memory/2352-1-0x00000000006C0000-0x000000000193C000-memory.dmp

memory/2352-2-0x000000001C660000-0x000000001C670000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\build.exe

MD5 5bf06998216b64bdde7e0356fff186e6
SHA1 2bfc86b0718eff41d4976212547fc651c75a5814
SHA256 b5f4a205a5c19245cfc9ea9a0e443d394b76f94af19f69144a084a5252c0da50
SHA512 1355ec92bf7eedba5b3785fb2ecc83aa91fb4beebdecca863c40f1e64925af9ee6281b78137ec891a278da808dbe4f3eca0828d6aece17f25cf061ab108e741c

memory/2292-14-0x0000000000920000-0x000000000093E000-memory.dmp

memory/2292-15-0x0000000074A50000-0x0000000075201000-memory.dmp

memory/2292-16-0x0000000005AA0000-0x00000000060B8000-memory.dmp

memory/2292-17-0x00000000053A0000-0x00000000053B2000-memory.dmp

memory/2292-18-0x0000000005400000-0x000000000543C000-memory.dmp

memory/2292-19-0x0000000005470000-0x0000000005480000-memory.dmp

memory/2292-20-0x0000000005480000-0x00000000054CC000-memory.dmp

memory/2352-21-0x00007FFC94D10000-0x00007FFC957D2000-memory.dmp

memory/2292-22-0x00000000056B0000-0x00000000057BA000-memory.dmp

memory/2292-23-0x0000000074A50000-0x0000000075201000-memory.dmp

memory/2292-24-0x0000000005470000-0x0000000005480000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-21 15:42

Reported

2024-04-21 15:48

Platform

win10v2004-20240412-en

Max time kernel

289s

Max time network

298s

Command Line

"C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe

"C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe"

C:\Users\Admin\AppData\Local\Temp\build.exe

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 month-washer.gl.at.ply.gg udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 156.33.209.4.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 17.14.97.104.in-addr.arpa udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 8.8.8.8:53 51.15.97.104.in-addr.arpa udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 8.8.8.8:53 26.73.42.20.in-addr.arpa udp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp
US 147.185.221.19:33498 month-washer.gl.at.ply.gg tcp

Files

memory/2832-0-0x00007FFCD2030000-0x00007FFCD2AF1000-memory.dmp

memory/2832-1-0x0000000000AB0000-0x0000000001D2C000-memory.dmp

memory/2832-2-0x0000000003FB0000-0x0000000003FC0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\build.exe

MD5 5bf06998216b64bdde7e0356fff186e6
SHA1 2bfc86b0718eff41d4976212547fc651c75a5814
SHA256 b5f4a205a5c19245cfc9ea9a0e443d394b76f94af19f69144a084a5252c0da50
SHA512 1355ec92bf7eedba5b3785fb2ecc83aa91fb4beebdecca863c40f1e64925af9ee6281b78137ec891a278da808dbe4f3eca0828d6aece17f25cf061ab108e741c

memory/864-14-0x0000000000AE0000-0x0000000000AFE000-memory.dmp

memory/864-15-0x0000000074F90000-0x0000000075740000-memory.dmp

memory/864-16-0x0000000005BE0000-0x00000000061F8000-memory.dmp

memory/864-17-0x00000000054A0000-0x00000000054B2000-memory.dmp

memory/864-18-0x0000000005500000-0x000000000553C000-memory.dmp

memory/2832-19-0x00007FFCD2030000-0x00007FFCD2AF1000-memory.dmp

memory/864-20-0x00000000055B0000-0x00000000055C0000-memory.dmp

memory/864-21-0x0000000005540000-0x000000000558C000-memory.dmp

memory/864-22-0x00000000057B0000-0x00000000058BA000-memory.dmp

memory/864-23-0x0000000074F90000-0x0000000075740000-memory.dmp

memory/864-24-0x00000000055B0000-0x00000000055C0000-memory.dmp