General

  • Target

    2024-06-27_58afae6c56cda5f25741e6ba31ad3722_ngrbot_poet-rat_sliver_snatch

  • Size

    9.5MB

  • Sample

    240627-gmmjpsvgnd

  • MD5

    58afae6c56cda5f25741e6ba31ad3722

  • SHA1

    c37af0a53a1c642b7d2402f48ede8902948da626

  • SHA256

    fb52751add2006c4a442c470772875278d22c091b4f317ae0d03126250a0d2ad

  • SHA512

    53d681e69836b07fb4b75f2368876caa6243295c887ad62eb61973922d8eedb71e14627f4e512ab0bbdb43af45301886e3907ff181c4722823347c9a03572014

  • SSDEEP

    98304:zdAPrGpha6grLZ4tJS6NQSBEgR8SF8k2nV38:2zGphk4tJSIQHuXuV38

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1252696978039636130/g9z0GlomdTtoSV1VeuxuDXCQsAVQeamKh882rI82-5MDpkkCU0uWJpi6P8B7E9BYLsUu

Targets

    • Target

      2024-06-27_58afae6c56cda5f25741e6ba31ad3722_ngrbot_poet-rat_sliver_snatch

    • Size

      9.5MB

    • MD5

      58afae6c56cda5f25741e6ba31ad3722

    • SHA1

      c37af0a53a1c642b7d2402f48ede8902948da626

    • SHA256

      fb52751add2006c4a442c470772875278d22c091b4f317ae0d03126250a0d2ad

    • SHA512

      53d681e69836b07fb4b75f2368876caa6243295c887ad62eb61973922d8eedb71e14627f4e512ab0bbdb43af45301886e3907ff181c4722823347c9a03572014

    • SSDEEP

      98304:zdAPrGpha6grLZ4tJS6NQSBEgR8SF8k2nV38:2zGphk4tJSIQHuXuV38

    • Skuld stealer

      An info stealer written in Go lang.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing possible sandbox system UUIDs

    • Detects executables referencing virtualization MAC addresses

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks