General
-
Target
main.exe
-
Size
14.2MB
-
Sample
240622-24wtxsyglf
-
MD5
79eb03e5760482cf9bf4a781de9aefd0
-
SHA1
cd27d46f8c5a134696d62b1521f71158f124b35a
-
SHA256
ffdac036f40a0d3bac9efa13a7d086dfce3a2a6ab3c5354fb37f56b822647885
-
SHA512
ee2067f5609223e029eebb7ccca96033d8cfad62321bf35baad133df79500edd376949800b073549a3ce09917e1f58d593b2fc933cd7fe23a000b253de34fe7d
-
SSDEEP
196608:TMhP4WgzpUmKAUTo4z3wVSIPLFFrL0AGtWT6U:TyP2Oo40HLvL7Gty
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1254198620102594621/No6jloWQ57wzq3vilj1sf51CnodPLo51Rm4myHwx_3QsP6yctAWQozLZQ-NPJTX5tFpl
Targets
-
-
Target
main.exe
-
Size
14.2MB
-
MD5
79eb03e5760482cf9bf4a781de9aefd0
-
SHA1
cd27d46f8c5a134696d62b1521f71158f124b35a
-
SHA256
ffdac036f40a0d3bac9efa13a7d086dfce3a2a6ab3c5354fb37f56b822647885
-
SHA512
ee2067f5609223e029eebb7ccca96033d8cfad62321bf35baad133df79500edd376949800b073549a3ce09917e1f58d593b2fc933cd7fe23a000b253de34fe7d
-
SSDEEP
196608:TMhP4WgzpUmKAUTo4z3wVSIPLFFrL0AGtWT6U:TyP2Oo40HLvL7Gty
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1