General
-
Target
skuld.vmp.exe
-
Size
8.1MB
-
Sample
240517-ct8y3adc52
-
MD5
174569d67669c13d4b2409637121348b
-
SHA1
51d1052973bd61a9f5f471f2995ca06e4ba23058
-
SHA256
e8f030f26fca7438975e013e08a7b8b4350ecb3da2f2dd0899de9675b6674e89
-
SHA512
38aedaeaddfdffbfa037b6b05874cb2ffd8a41e4f5612de6265ece1cb6acf82ddfc5bdbc2e076be6c521fda1e608113fb6b1dc1274e1b39db4fe077aebc15569
-
SSDEEP
196608:se5x0vqKyqp9MjTM1XLmCmCN20+KHQ8/vDBum2gRoI:z70SKjnMjTUXCpI20g8DsZfI
Behavioral task
behavioral1
Sample
skuld.vmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
skuld.vmp.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
skuld.vmp.exe
-
Size
8.1MB
-
MD5
174569d67669c13d4b2409637121348b
-
SHA1
51d1052973bd61a9f5f471f2995ca06e4ba23058
-
SHA256
e8f030f26fca7438975e013e08a7b8b4350ecb3da2f2dd0899de9675b6674e89
-
SHA512
38aedaeaddfdffbfa037b6b05874cb2ffd8a41e4f5612de6265ece1cb6acf82ddfc5bdbc2e076be6c521fda1e608113fb6b1dc1274e1b39db4fe077aebc15569
-
SSDEEP
196608:se5x0vqKyqp9MjTM1XLmCmCN20+KHQ8/vDBum2gRoI:z70SKjnMjTUXCpI20g8DsZfI
Score8/10-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1