General

  • Target

    skuld.exe

  • Size

    9.5MB

  • Sample

    240623-1dvy9swfmk

  • MD5

    37681ae19279fec51c002e7f6907bced

  • SHA1

    d6dce788f74a5c827a84f7a28953dab34684ae29

  • SHA256

    cd4fffe44462f93456326d20ad8a22ea1be87c9ba1670fb7e2e414e5e7c1c83f

  • SHA512

    e80abbfd9d1ff49f90c097db2ad975d48df59b97ef922692e8b8adbac8629965008924064358b218e864b588c0d52e3c44245a08cc712f8c403b21180c1d8f30

  • SSDEEP

    98304:60fFH9tHce0xpD034tfgPSgqaWqjOEMCoEBTp6u:LT5cZxB1YSgqabjrMCL6u

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1254543345703977021/GGEp1kTIdcnrlXbkstceRTKYL1MjeavIS4CYW77UE3k75CymaXcXytUfkZVnLNW1d_wt

Targets

    • Target

      skuld.exe

    • Size

      9.5MB

    • MD5

      37681ae19279fec51c002e7f6907bced

    • SHA1

      d6dce788f74a5c827a84f7a28953dab34684ae29

    • SHA256

      cd4fffe44462f93456326d20ad8a22ea1be87c9ba1670fb7e2e414e5e7c1c83f

    • SHA512

      e80abbfd9d1ff49f90c097db2ad975d48df59b97ef922692e8b8adbac8629965008924064358b218e864b588c0d52e3c44245a08cc712f8c403b21180c1d8f30

    • SSDEEP

      98304:60fFH9tHce0xpD034tfgPSgqaWqjOEMCoEBTp6u:LT5cZxB1YSgqabjrMCL6u

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks