General
-
Target
skuld.exe
-
Size
5.5MB
-
Sample
240517-g8d5fsdg69
-
MD5
db9e6fd7dff621e00659b39cc8d580ad
-
SHA1
67661aa6030d83da51d2b29ec13b7fda595260c0
-
SHA256
dea6c2f8a96c9514d037d420f3b7671140fa39b4e21bf3cda7a6a6d81e2f2118
-
SHA512
4df62ed841570c3492dc0089ff48351e8da51a9adb21eb20056f3b3d7885012431934c376ab40dc8d3adfb0de8c2400fbba9b0292064fe673048fe99d2e03248
-
SSDEEP
98304:B9pfY3PaM/pd850w04aAyR2CVBPW5xZSKWp+JoqRC+0wBM2K6zmn42LM:BnAxdK0noy2CVFWBc4J5RC+0we2Kcc4Y
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
skuld.exe
-
Size
5.5MB
-
MD5
db9e6fd7dff621e00659b39cc8d580ad
-
SHA1
67661aa6030d83da51d2b29ec13b7fda595260c0
-
SHA256
dea6c2f8a96c9514d037d420f3b7671140fa39b4e21bf3cda7a6a6d81e2f2118
-
SHA512
4df62ed841570c3492dc0089ff48351e8da51a9adb21eb20056f3b3d7885012431934c376ab40dc8d3adfb0de8c2400fbba9b0292064fe673048fe99d2e03248
-
SSDEEP
98304:B9pfY3PaM/pd850w04aAyR2CVBPW5xZSKWp+JoqRC+0wBM2K6zmn42LM:BnAxdK0noy2CVFWBc4J5RC+0we2Kcc4Y
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1