General

  • Target

    slinky.exe

  • Size

    14.2MB

  • Sample

    240728-l17h9athmc

  • MD5

    8fc4e318ccc2ac32e26f58a2a7463698

  • SHA1

    b7e1768ffcca9174ba03bb1ee6f3a302ea3ab1fc

  • SHA256

    5f2ed91be1c0731cdcc4ccb888aa3cdc42cf3ba65193dad500fd0122477ef579

  • SHA512

    fcaaf40a74892947dc2eed94c7344f8d2cc11d8f3ef646033978a03eae7fb417ea99d7679f9a20aa3a5a8ac7edc0931c4767797bd1ffe69a6f0b5a4569705315

  • SSDEEP

    196608:LWJafoL/tUoTX4Zqbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:LWsfm/Lbh1lkSFCdTauZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1267057730678427720/vvlkPl7BTv17Ul9ssbMi39EwrDKqRRbl-Jz88_uJB5XvNhm668d8DKRGlUUpUvNoXpwr

Targets

    • Target

      slinky.exe

    • Size

      14.2MB

    • MD5

      8fc4e318ccc2ac32e26f58a2a7463698

    • SHA1

      b7e1768ffcca9174ba03bb1ee6f3a302ea3ab1fc

    • SHA256

      5f2ed91be1c0731cdcc4ccb888aa3cdc42cf3ba65193dad500fd0122477ef579

    • SHA512

      fcaaf40a74892947dc2eed94c7344f8d2cc11d8f3ef646033978a03eae7fb417ea99d7679f9a20aa3a5a8ac7edc0931c4767797bd1ffe69a6f0b5a4569705315

    • SSDEEP

      196608:LWJafoL/tUoTX4Zqbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:LWsfm/Lbh1lkSFCdTauZo

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks