General
-
Target
slinky.exe
-
Size
14.2MB
-
Sample
241005-2bth4ayhqe
-
MD5
7e26817146b9ca70f5a1f271b381fdc8
-
SHA1
a87a69fa8c6833f818f878f6c5a5ec010b99dae4
-
SHA256
ceeaced15d7a6d72bea0aa59bb3caccc5d5e0089b4b980658c5709d3f96b31fb
-
SHA512
fa625fc2b8a68494fdf5b46a7a1b1d2a2188970825ca85deab268a66db920e3677c2dad09e87c73976ad7ee04d3645db1ab06f1048a9260695be47c3b2a361d8
-
SSDEEP
196608:iWJafoL/tUoTX4Zdbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:iWsfm/Qbh1lkSFCdTauZo
Behavioral task
behavioral1
Sample
slinky.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
slinky.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1291675112323416086/ekKHKYdeTlB5ft63sBznu78rlTl4WJVeYMB2w6UXjxlTDqVo5r3nhS1SDDIxbzvUjs9p
Targets
-
-
Target
slinky.exe
-
Size
14.2MB
-
MD5
7e26817146b9ca70f5a1f271b381fdc8
-
SHA1
a87a69fa8c6833f818f878f6c5a5ec010b99dae4
-
SHA256
ceeaced15d7a6d72bea0aa59bb3caccc5d5e0089b4b980658c5709d3f96b31fb
-
SHA512
fa625fc2b8a68494fdf5b46a7a1b1d2a2188970825ca85deab268a66db920e3677c2dad09e87c73976ad7ee04d3645db1ab06f1048a9260695be47c3b2a361d8
-
SSDEEP
196608:iWJafoL/tUoTX4Zdbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:iWsfm/Qbh1lkSFCdTauZo
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1