General
-
Target
slinky.rar
-
Size
26.1MB
-
Sample
240723-krcf3sxdmc
-
MD5
c02d06b6616e43e6a5b993ffd6e9ab02
-
SHA1
69b0b00cbbf5f06eaf6da1d708c910146118613b
-
SHA256
8e821d40a03bf219e4823ca648e19948ffe8a5e9d02c0917c61010d6d78fab65
-
SHA512
d239c0600971f283917b64d4b081c1db9e6a12bd6ec565252906a00c7e4ca888a97a70e4647b6c16ea7eebaa63f8c3dd819120c89ad4ac3a1171c3562d73fbda
-
SSDEEP
786432:GDR8xQWsib535X/elpmNnnFqbZ6dvXRs+:GGQWF5JX/efY5B
Behavioral task
behavioral1
Sample
slinky/slinky.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
slinky/slinky_library.dll
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
slinky/slinkyhook.dll
Resource
win11-20240709-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1262304792059969556/fyUPRB5FdDVKkteeBILMdxxwDztQAiGbPM8LGLyvygZZy-OC8qRpJvw9ZEofIWBHqRjM
Targets
-
-
Target
slinky/slinky.exe
-
Size
14.2MB
-
MD5
408214e2e5474991acddca75350c23df
-
SHA1
196aba366c6fefc2f9075a19186b47319cfd5c3a
-
SHA256
854dda4311f184951a17cee9b36f40414c8b19808b96daff7b2139f446851a9a
-
SHA512
171ce4c86cd38cff4403604698207f114b4834b8812de6803d73716fdb83bd72031576f47cb7a89a2203d123f3bc14288c2a229af5be5db3d64c3165fa3e6d8b
-
SSDEEP
196608:7WJafoL/tUoTX4ZXbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:7Wsfm/6bh1lkSFCdTauZo
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
-
-
Target
slinky/slinky_library.dll
-
Size
11.7MB
-
MD5
f4f7eacab208d7b50d50f196bd3facd2
-
SHA1
82ca056ecb89d1612df069a42952e077f7e079e1
-
SHA256
4f35cfe4d051d56cc22dc2743024ffa0f3b4ee906b34c4336c72d71bc55de708
-
SHA512
9b61bd125e066df121186057bcb163bfb3d8fb9ff3447963df0e9b14ab57fdf6a8d1faf61a5e75dc3e53425f541bb624b9d8b787e322ea6b675489d532b8f001
-
SSDEEP
3:WAYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYJYw:z
Score1/10 -
-
-
Target
slinky/slinkyhook.dll
-
Size
228KB
-
MD5
6d8c17c67970cb5841811eed8adffffc
-
SHA1
c869ab32318a035e51aff8e5e11b4cd25fb52a4f
-
SHA256
7c4234fac3b6b3e96dace1e71c7a952ec67e3839f90f7a88a9ea283bf88d25b8
-
SHA512
7d2a0ffcd72c8bf4a96b2ed722d7119749ec14f5d7e6a601cb6ae4a5b1c4a652b694158f01da340e3ca4751cabd0a56c42bf739d8b421e36937f3691b3b80c72
-
SSDEEP
3072:hXxN1I6PgabbAzVxPLI5oIa5amK/1o4ptgELHY1lNyc+m+e7P26g66OVuknsDe0u:hhN1GFZq/15tFc+m97ieuknsDu
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1