General

  • Target

    SlinkyPremium.rar

  • Size

    78.2MB

  • Sample

    240820-h473eazala

  • MD5

    2483b53d0ffc27518093146f2d3af71e

  • SHA1

    d8608af9de7c63c33f43a7631cc2806ffc5b5987

  • SHA256

    630d7b5e44ffca4f8401e6d6f91c945a6b9a761757ebb4ef78f1956965a0ac3f

  • SHA512

    a9cc689090d582bfa5efbe0494ed99a8ef4de3ffa6d2630cb1e98658327a6d70127fc6fd3ce167ca3c0027c88ab1cb8278230ee1f05a81a625d3a35fa99bc0c2

  • SSDEEP

    1572864:oWnr69FMcqMatp8KgJPHzcF2acgGQLskLR9yhFwzKGXYfaAOfFBKs+8uDQnvD:brcgZX8Kg1TcigVJ99u+/XYynfXluQD

Malware Config

Targets

    • Target

      SlinkyPremium.exe

    • Size

      81.2MB

    • MD5

      593dd2fee92162f0f2af53c6875bfbe7

    • SHA1

      56a66161c5fff9115719a7f3015dd330506b42e3

    • SHA256

      95e048872fa8028cf1fd9adf1b4912c76e6da2dcffe93899af647ade6982e212

    • SHA512

      32b595f92dfde6866a1c7c2cce87af690852f3dc41dfbf3c8f2425f0d0fa4f97b914ec32e1d801c9cb9e2decc68655b211c4d5348e67371531f0bf29dbaf8471

    • SSDEEP

      1572864:8vxZQglhWL07vaSk8IpG7V+VPhqcPE7hlgkiYgj+h58sMwbC9ZqvcJzU:8vxZxfLeSkB05awcSeu569ZxU

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks