General

  • Target

    wso6rghb.exe

  • Size

    31.5MB

  • Sample

    240622-zz4mvsvapb

  • MD5

    44463a510f5c916dee00f95536f17c03

  • SHA1

    4ea56721d3d3dfad48350f8dc0062a88933bfe26

  • SHA256

    d53109ba9cd341b681f38af94dad53cebbb1aa8cfbe87252f37e51cceb0409c4

  • SHA512

    70a9a806d51ecfe57d44b0fec766c1caa79921d81cf3a830e8beef340ce503d778608b82bcdfb17e83ae90334e222a4336ad913deed873ada3e789edb8d9bbac

  • SSDEEP

    786432:L8DYYU85aXV48IX2fbXiuQd2xPEdW4KbmHf2etV:9YU85CxsKbXGuPEdW4vDV

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1254118767479230536/uMZWbLjVaGr8S-PRvi_Z47CPXEDiOJ-ssPsLmthPiK0slWmgI1yaAACp9fcD_soa2x8n

Targets

    • Target

      wso6rghb.exe

    • Size

      31.5MB

    • MD5

      44463a510f5c916dee00f95536f17c03

    • SHA1

      4ea56721d3d3dfad48350f8dc0062a88933bfe26

    • SHA256

      d53109ba9cd341b681f38af94dad53cebbb1aa8cfbe87252f37e51cceb0409c4

    • SHA512

      70a9a806d51ecfe57d44b0fec766c1caa79921d81cf3a830e8beef340ce503d778608b82bcdfb17e83ae90334e222a4336ad913deed873ada3e789edb8d9bbac

    • SSDEEP

      786432:L8DYYU85aXV48IX2fbXiuQd2xPEdW4KbmHf2etV:9YU85CxsKbXGuPEdW4vDV

    • Skuld stealer

      An info stealer written in Go lang.

    • UAC bypass

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks