General
-
Target
slinky.exe
-
Size
14.8MB
-
Sample
250221-xez3tsxlc1
-
MD5
58bc5cc47fa258cd1be97ee171a551d6
-
SHA1
d359a53319cd2d6da314b1d3d3626c9d2f455f8d
-
SHA256
28d351252216d3ac879ed61553fabb73ba58890ad1a603ecf23083e07dc00612
-
SHA512
2e7de308bce8865dcca1ca25c78d0be9128ad4efe0f48a7e4216c04822b07325964bfb2a0958952f10e155e510a450bbab113cf2e92a7a0017bf05335676ab55
-
SSDEEP
196608:DqZ4f/oCqKqc/3h4Po9NXx+29GAB7ob73mrVGwYdNE2vfUW:OZ4XoBKHN9AuM73gQDvfUW
Behavioral task
behavioral1
Sample
slinky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
slinky.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1342388168812527616/-lRZ8Lzq0-yW-y8xBH1Y_PX4RtQflysH7EEHAsl_JbK32v8hRM3xrYRbVdzoiRn3xwmE
Targets
-
-
Target
slinky.exe
-
Size
14.8MB
-
MD5
58bc5cc47fa258cd1be97ee171a551d6
-
SHA1
d359a53319cd2d6da314b1d3d3626c9d2f455f8d
-
SHA256
28d351252216d3ac879ed61553fabb73ba58890ad1a603ecf23083e07dc00612
-
SHA512
2e7de308bce8865dcca1ca25c78d0be9128ad4efe0f48a7e4216c04822b07325964bfb2a0958952f10e155e510a450bbab113cf2e92a7a0017bf05335676ab55
-
SSDEEP
196608:DqZ4f/oCqKqc/3h4Po9NXx+29GAB7ob73mrVGwYdNE2vfUW:OZ4XoBKHN9AuM73gQDvfUW
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-