Resubmissions
08-11-2024 22:44
241108-2nx22s1jg1 10General
-
Target
slinky.exe
-
Size
14.2MB
-
Sample
241108-2nx22s1jg1
-
MD5
d02a74cc7cb238ae3ef85ea82fade1ed
-
SHA1
af4b5c5c803f76faace1695b4a7018f1b87c3a51
-
SHA256
64fd7264b8e2bc82b4012b191049a923f8bb3dc6d99c261a2ad07871f1d8b91c
-
SHA512
77696145cab73ce201e5231feb020f645fa0cd23fcd4b1eef0cd695e5544410a3f127dd0c6f3723a17836e59f90e96e50770591650f3ce36fe22f1ce2168f04b
-
SSDEEP
196608:ZWJafoL/tUoTX4Z2bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:ZWsfm/vbh1lkSFCdTauZo
Behavioral task
behavioral1
Sample
slinky.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1296774769303359571/SuAqJEaZ8HyMJeY4XNdTzjqboa7EQQC9NlFu7Nm8gWVWabNPEFyEqvUIK1mdFAcYMMWN
Targets
-
-
Target
slinky.exe
-
Size
14.2MB
-
MD5
d02a74cc7cb238ae3ef85ea82fade1ed
-
SHA1
af4b5c5c803f76faace1695b4a7018f1b87c3a51
-
SHA256
64fd7264b8e2bc82b4012b191049a923f8bb3dc6d99c261a2ad07871f1d8b91c
-
SHA512
77696145cab73ce201e5231feb020f645fa0cd23fcd4b1eef0cd695e5544410a3f127dd0c6f3723a17836e59f90e96e50770591650f3ce36fe22f1ce2168f04b
-
SSDEEP
196608:ZWJafoL/tUoTX4Z2bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:ZWsfm/vbh1lkSFCdTauZo
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1