General

  • Target

    Slinky-Client-Latest-Download-05-21

  • Size

    7KB

  • Sample

    241108-a58fkatphk

  • MD5

    e42d80ea3d8aed38bb82de09f225445a

  • SHA1

    0d43a6e06593eb10def3be245bc8b0be6a3ed91c

  • SHA256

    d659cc921f33f877c5962835dfdcc9e067048a834398a2602d0aa3d06d23f050

  • SHA512

    e922b18cd780a7d2e8e77364609ddb8eda322e2fd5fbdfc922024d2c5f0f8e58f783fe0d1c3aedc46f6fbb9c1c396ad443a088f6ab31a8db694f1e1a71460e5c

  • SSDEEP

    96:8suWzC+/Eur2+FkfjmZ/QT/vaYqPJjeIJumKF95RZjieojwXZkIaqPel:Nu+8V+y7m5QTvqJjeeu1hkrIe

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1296774769303359571/SuAqJEaZ8HyMJeY4XNdTzjqboa7EQQC9NlFu7Nm8gWVWabNPEFyEqvUIK1mdFAcYMMWN

Targets

    • Target

      Slinky-Client-Latest-Download-05-21

    • Size

      7KB

    • MD5

      e42d80ea3d8aed38bb82de09f225445a

    • SHA1

      0d43a6e06593eb10def3be245bc8b0be6a3ed91c

    • SHA256

      d659cc921f33f877c5962835dfdcc9e067048a834398a2602d0aa3d06d23f050

    • SHA512

      e922b18cd780a7d2e8e77364609ddb8eda322e2fd5fbdfc922024d2c5f0f8e58f783fe0d1c3aedc46f6fbb9c1c396ad443a088f6ab31a8db694f1e1a71460e5c

    • SSDEEP

      96:8suWzC+/Eur2+FkfjmZ/QT/vaYqPJjeIJumKF95RZjieojwXZkIaqPel:Nu+8V+y7m5QTvqJjeeu1hkrIe

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks