General

  • Target

    slinky.exe

  • Size

    14.2MB

  • MD5

    594656d7741bdf54df99d5b8e7262fae

  • SHA1

    ada692f9ce98a7aeb191c6056b99ceb0316ea7ca

  • SHA256

    87f5cf612d37b2728d5be155ab9cde88f6e3533e2f3a5d54f525e36efee5ebb9

  • SHA512

    93d2b7f3b61e9bbae30475e83e8cb01aeea56e57f87593c1b02697089a944ae80321fb7ec3c743ef3eb7fe7a0ffb2a221f088dda41564fa099891a36c8f5ccf6

  • SSDEEP

    196608:RWJafoL/tUoTX4Z1bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:RWsfm/Ybh1lkSFCdTauZo

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1258369365653590047/EnLUj86Q5mMlspC_S8uudFa50pjnCU3wL_mQTEg0iewTCmNpN3bDimN1hu9bdri0gDIN

Signatures

  • Skuld family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • slinky.exe
    .exe windows:6 windows x64 arch:x64

    Password: dontfindmyhookpls

    c2d457ad8ac36fc9f18d45bffcd450c2


    Headers

    Imports

    Sections