General
-
Target
slinky.exe
-
Size
14.2MB
-
Sample
240704-ml7fdayake
-
MD5
594656d7741bdf54df99d5b8e7262fae
-
SHA1
ada692f9ce98a7aeb191c6056b99ceb0316ea7ca
-
SHA256
87f5cf612d37b2728d5be155ab9cde88f6e3533e2f3a5d54f525e36efee5ebb9
-
SHA512
93d2b7f3b61e9bbae30475e83e8cb01aeea56e57f87593c1b02697089a944ae80321fb7ec3c743ef3eb7fe7a0ffb2a221f088dda41564fa099891a36c8f5ccf6
-
SSDEEP
196608:RWJafoL/tUoTX4Z1bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:RWsfm/Ybh1lkSFCdTauZo
Behavioral task
behavioral1
Sample
slinky.exe
Resource
win11-20240611-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1258369365653590047/EnLUj86Q5mMlspC_S8uudFa50pjnCU3wL_mQTEg0iewTCmNpN3bDimN1hu9bdri0gDIN
Targets
-
-
Target
slinky.exe
-
Size
14.2MB
-
MD5
594656d7741bdf54df99d5b8e7262fae
-
SHA1
ada692f9ce98a7aeb191c6056b99ceb0316ea7ca
-
SHA256
87f5cf612d37b2728d5be155ab9cde88f6e3533e2f3a5d54f525e36efee5ebb9
-
SHA512
93d2b7f3b61e9bbae30475e83e8cb01aeea56e57f87593c1b02697089a944ae80321fb7ec3c743ef3eb7fe7a0ffb2a221f088dda41564fa099891a36c8f5ccf6
-
SSDEEP
196608:RWJafoL/tUoTX4Z1bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:RWsfm/Ybh1lkSFCdTauZo
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1