Resubmissions

21-09-2024 21:30

240921-1cq9pavdqb 10

General

  • Target

    slinky.exe

  • Size

    14.2MB

  • Sample

    240921-1cq9pavdqb

  • MD5

    c9726c4a4abad20437c739da95356bde

  • SHA1

    9fcf6789537739c0ab14c595457731339ec8d1df

  • SHA256

    0c2a0800aa414e812058e3850662ae65e2aa4c71a0edc7b927e6840a207c008c

  • SHA512

    90e668d2bf01fa5a7bf228801e7a463ce9d1782c7ec71300cc90f8d17d49f16662eb901c4046f8d81799ce31a01d250b94950a326520ff0c447e33ff04b28504

  • SSDEEP

    196608:fWJafoL/tUoTX4ZLbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:fWsfm/abh1lkSFCdTauZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1285675977959276624/DBqyLbkaukkhzK7HW1SFuwFi7-_95zmmwJpTzPfWGLhJoP31WFoU5xWQU6LbcK_oNgpa

Targets

    • Target

      slinky.exe

    • Size

      14.2MB

    • MD5

      c9726c4a4abad20437c739da95356bde

    • SHA1

      9fcf6789537739c0ab14c595457731339ec8d1df

    • SHA256

      0c2a0800aa414e812058e3850662ae65e2aa4c71a0edc7b927e6840a207c008c

    • SHA512

      90e668d2bf01fa5a7bf228801e7a463ce9d1782c7ec71300cc90f8d17d49f16662eb901c4046f8d81799ce31a01d250b94950a326520ff0c447e33ff04b28504

    • SSDEEP

      196608:fWJafoL/tUoTX4ZLbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:fWsfm/abh1lkSFCdTauZo

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks