General

  • Target

    main.exe

  • Size

    14.2MB

  • Sample

    240622-24wtxsyglf

  • MD5

    79eb03e5760482cf9bf4a781de9aefd0

  • SHA1

    cd27d46f8c5a134696d62b1521f71158f124b35a

  • SHA256

    ffdac036f40a0d3bac9efa13a7d086dfce3a2a6ab3c5354fb37f56b822647885

  • SHA512

    ee2067f5609223e029eebb7ccca96033d8cfad62321bf35baad133df79500edd376949800b073549a3ce09917e1f58d593b2fc933cd7fe23a000b253de34fe7d

  • SSDEEP

    196608:TMhP4WgzpUmKAUTo4z3wVSIPLFFrL0AGtWT6U:TyP2Oo40HLvL7Gty

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1254198620102594621/No6jloWQ57wzq3vilj1sf51CnodPLo51Rm4myHwx_3QsP6yctAWQozLZQ-NPJTX5tFpl

Targets

    • Target

      main.exe

    • Size

      14.2MB

    • MD5

      79eb03e5760482cf9bf4a781de9aefd0

    • SHA1

      cd27d46f8c5a134696d62b1521f71158f124b35a

    • SHA256

      ffdac036f40a0d3bac9efa13a7d086dfce3a2a6ab3c5354fb37f56b822647885

    • SHA512

      ee2067f5609223e029eebb7ccca96033d8cfad62321bf35baad133df79500edd376949800b073549a3ce09917e1f58d593b2fc933cd7fe23a000b253de34fe7d

    • SSDEEP

      196608:TMhP4WgzpUmKAUTo4z3wVSIPLFFrL0AGtWT6U:TyP2Oo40HLvL7Gty

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks