Resubmissions

21-06-2024 17:03

240621-vk1v7sscnj 10

21-06-2024 16:58

240621-vgylnsyame 10

General

  • Target

    skuld.exe

  • Size

    3.6MB

  • Sample

    240621-vk1v7sscnj

  • MD5

    a8f98b8c5fabdb5d98e846a881d01160

  • SHA1

    e9d905d738dd08320c6597895a458c0715064afe

  • SHA256

    80341b552263504bdf36141bb2395b47b46f36103199114ee062638b2647218b

  • SHA512

    f6dfbd89fd9dd59c3aaf3e7015b118645ed566b3f04fbf47aa6eed7f4e5b9e21a766a0d4a33d69dc14141d3885cfcc1b348a1fa1bd9ecb49c3d2b58a2309f9e5

  • SSDEEP

    98304:klGnOou/444S1WLUdyQ4gpqNw4vVJUtEZRqvPfP:kl3p0qWLUdyQeN99JXZRAf

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1245114234849857687/daxsN36lID-vnVsfVRF8nE1MGdVZLBGl0vKyAzFMGW2dHR4jux0-O3FHuabdkgdQ7Xvo

Targets

    • Target

      skuld.exe

    • Size

      3.6MB

    • MD5

      a8f98b8c5fabdb5d98e846a881d01160

    • SHA1

      e9d905d738dd08320c6597895a458c0715064afe

    • SHA256

      80341b552263504bdf36141bb2395b47b46f36103199114ee062638b2647218b

    • SHA512

      f6dfbd89fd9dd59c3aaf3e7015b118645ed566b3f04fbf47aa6eed7f4e5b9e21a766a0d4a33d69dc14141d3885cfcc1b348a1fa1bd9ecb49c3d2b58a2309f9e5

    • SSDEEP

      98304:klGnOou/444S1WLUdyQ4gpqNw4vVJUtEZRqvPfP:kl3p0qWLUdyQeN99JXZRAf

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks