Resubmissions

General

  • Target

    skuld.exe

  • Size

    5.5MB

  • Sample

    240517-g8d5fsdg69

  • MD5

    db9e6fd7dff621e00659b39cc8d580ad

  • SHA1

    67661aa6030d83da51d2b29ec13b7fda595260c0

  • SHA256

    dea6c2f8a96c9514d037d420f3b7671140fa39b4e21bf3cda7a6a6d81e2f2118

  • SHA512

    4df62ed841570c3492dc0089ff48351e8da51a9adb21eb20056f3b3d7885012431934c376ab40dc8d3adfb0de8c2400fbba9b0292064fe673048fe99d2e03248

  • SSDEEP

    98304:B9pfY3PaM/pd850w04aAyR2CVBPW5xZSKWp+JoqRC+0wBM2K6zmn42LM:BnAxdK0noy2CVFWBc4J5RC+0we2Kcc4Y

Malware Config

Targets

    • Target

      skuld.exe

    • Size

      5.5MB

    • MD5

      db9e6fd7dff621e00659b39cc8d580ad

    • SHA1

      67661aa6030d83da51d2b29ec13b7fda595260c0

    • SHA256

      dea6c2f8a96c9514d037d420f3b7671140fa39b4e21bf3cda7a6a6d81e2f2118

    • SHA512

      4df62ed841570c3492dc0089ff48351e8da51a9adb21eb20056f3b3d7885012431934c376ab40dc8d3adfb0de8c2400fbba9b0292064fe673048fe99d2e03248

    • SSDEEP

      98304:B9pfY3PaM/pd850w04aAyR2CVBPW5xZSKWp+JoqRC+0wBM2K6zmn42LM:BnAxdK0noy2CVFWBc4J5RC+0we2Kcc4Y

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks