General

  • Target

    d32b6497f96085710fd6a1ad10e82330.bin

  • Size

    9.3MB

  • Sample

    240625-c2v26swepb

  • MD5

    d32b6497f96085710fd6a1ad10e82330

  • SHA1

    11af8afa2f63fd797e6dbe306ea8181c3480119a

  • SHA256

    429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712

  • SHA512

    e6eb4ec19ad1d3f813028428b81fc931bd6739845958b541c2b70425bed553910467c29df6ccdc0d6fb9cc30cca91491e632bb30e5cf38a2109b30dc9e014b2f

  • SSDEEP

    98304:wsGLMqMUzFeUoGgcmmPsWvpIqGEV6wKIii8HlD+:EBMUzQyPsWvCqjsfD

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1254543345703977021/GGEp1kTIdcnrlXbkstceRTKYL1MjeavIS4CYW77UE3k75CymaXcXytUfkZVnLNW1d_wt

Targets

    • Target

      d32b6497f96085710fd6a1ad10e82330.bin

    • Size

      9.3MB

    • MD5

      d32b6497f96085710fd6a1ad10e82330

    • SHA1

      11af8afa2f63fd797e6dbe306ea8181c3480119a

    • SHA256

      429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712

    • SHA512

      e6eb4ec19ad1d3f813028428b81fc931bd6739845958b541c2b70425bed553910467c29df6ccdc0d6fb9cc30cca91491e632bb30e5cf38a2109b30dc9e014b2f

    • SSDEEP

      98304:wsGLMqMUzFeUoGgcmmPsWvpIqGEV6wKIii8HlD+:EBMUzQyPsWvCqjsfD

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks