Resubmissions

05-10-2024 22:24

241005-2bth4ayhqe 10

05-10-2024 22:21

241005-19z8vsvbpk 10

General

  • Target

    slinky.exe

  • Size

    14.2MB

  • Sample

    241005-2bth4ayhqe

  • MD5

    7e26817146b9ca70f5a1f271b381fdc8

  • SHA1

    a87a69fa8c6833f818f878f6c5a5ec010b99dae4

  • SHA256

    ceeaced15d7a6d72bea0aa59bb3caccc5d5e0089b4b980658c5709d3f96b31fb

  • SHA512

    fa625fc2b8a68494fdf5b46a7a1b1d2a2188970825ca85deab268a66db920e3677c2dad09e87c73976ad7ee04d3645db1ab06f1048a9260695be47c3b2a361d8

  • SSDEEP

    196608:iWJafoL/tUoTX4Zdbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:iWsfm/Qbh1lkSFCdTauZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1291675112323416086/ekKHKYdeTlB5ft63sBznu78rlTl4WJVeYMB2w6UXjxlTDqVo5r3nhS1SDDIxbzvUjs9p

Targets

    • Target

      slinky.exe

    • Size

      14.2MB

    • MD5

      7e26817146b9ca70f5a1f271b381fdc8

    • SHA1

      a87a69fa8c6833f818f878f6c5a5ec010b99dae4

    • SHA256

      ceeaced15d7a6d72bea0aa59bb3caccc5d5e0089b4b980658c5709d3f96b31fb

    • SHA512

      fa625fc2b8a68494fdf5b46a7a1b1d2a2188970825ca85deab268a66db920e3677c2dad09e87c73976ad7ee04d3645db1ab06f1048a9260695be47c3b2a361d8

    • SSDEEP

      196608:iWJafoL/tUoTX4Zdbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:iWsfm/Qbh1lkSFCdTauZo

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks