General

  • Target

    slinky.rar

  • Size

    26.7MB

  • Sample

    241219-w7l61axqek

  • MD5

    6167815d4b03b0e2358fde44d2a72dc8

  • SHA1

    116a0dd027297fc508af88474eb91a42c404adc0

  • SHA256

    deeb97f0f1c214a3ea516c6467e09290f2d57d73700c797f94cd093ff09cc449

  • SHA512

    3f8e009e668efe7750b97b2a189de1d42754961f182368245896b7c6f9f8f2ece51932e0bf69c5246e2278038128a694256cdc8d627c2edd8697b8256d4929b2

  • SSDEEP

    786432:OIH7Y1jHsZV2gzap6dfuRFUfiSbrTk4vp+/i:/HhVmA9uRFUffFA/i

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1319318020065329273/3AaCw_G2NduTV5mA1DiR0dl0L2Cpv4x0nhnO3bxKHxBo97sZ5sMcWCshTRq8yNoEUPih

Targets

    • Target

      slinky.rar

    • Size

      26.7MB

    • MD5

      6167815d4b03b0e2358fde44d2a72dc8

    • SHA1

      116a0dd027297fc508af88474eb91a42c404adc0

    • SHA256

      deeb97f0f1c214a3ea516c6467e09290f2d57d73700c797f94cd093ff09cc449

    • SHA512

      3f8e009e668efe7750b97b2a189de1d42754961f182368245896b7c6f9f8f2ece51932e0bf69c5246e2278038128a694256cdc8d627c2edd8697b8256d4929b2

    • SSDEEP

      786432:OIH7Y1jHsZV2gzap6dfuRFUfiSbrTk4vp+/i:/HhVmA9uRFUffFA/i

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks