General
-
Target
Slinky-Client-Latest-Download-05-21
-
Size
7KB
-
Sample
241108-a58fkatphk
-
MD5
e42d80ea3d8aed38bb82de09f225445a
-
SHA1
0d43a6e06593eb10def3be245bc8b0be6a3ed91c
-
SHA256
d659cc921f33f877c5962835dfdcc9e067048a834398a2602d0aa3d06d23f050
-
SHA512
e922b18cd780a7d2e8e77364609ddb8eda322e2fd5fbdfc922024d2c5f0f8e58f783fe0d1c3aedc46f6fbb9c1c396ad443a088f6ab31a8db694f1e1a71460e5c
-
SSDEEP
96:8suWzC+/Eur2+FkfjmZ/QT/vaYqPJjeIJumKF95RZjieojwXZkIaqPel:Nu+8V+y7m5QTvqJjeeu1hkrIe
Static task
static1
Behavioral task
behavioral1
Sample
Slinky-Client-Latest-Download-05-21.html
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1296774769303359571/SuAqJEaZ8HyMJeY4XNdTzjqboa7EQQC9NlFu7Nm8gWVWabNPEFyEqvUIK1mdFAcYMMWN
Targets
-
-
Target
Slinky-Client-Latest-Download-05-21
-
Size
7KB
-
MD5
e42d80ea3d8aed38bb82de09f225445a
-
SHA1
0d43a6e06593eb10def3be245bc8b0be6a3ed91c
-
SHA256
d659cc921f33f877c5962835dfdcc9e067048a834398a2602d0aa3d06d23f050
-
SHA512
e922b18cd780a7d2e8e77364609ddb8eda322e2fd5fbdfc922024d2c5f0f8e58f783fe0d1c3aedc46f6fbb9c1c396ad443a088f6ab31a8db694f1e1a71460e5c
-
SSDEEP
96:8suWzC+/Eur2+FkfjmZ/QT/vaYqPJjeIJumKF95RZjieojwXZkIaqPel:Nu+8V+y7m5QTvqJjeeu1hkrIe
Score10/10-
Skuld family
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1