General

  • Target

    2024-06-27_73c265ce417e5a4d23c841f2c02d5956_ngrbot_poet-rat_sliver_snatch

  • Size

    9.5MB

  • Sample

    240627-gqvdqaybjn

  • MD5

    73c265ce417e5a4d23c841f2c02d5956

  • SHA1

    902c82c28a7f09f42d14c69bc0c50e17f037698b

  • SHA256

    cc208b61c6aa312b4d2321f0397423c9b19a271f3b0753a8d0c2e020c73d10ca

  • SHA512

    6d4beac332adc5f8df96aa2fb99c106e1cc1ee24a003b19305de9ffec0077ed7c0d539742662016f5f804fd9cadfa108c5e2e90e1bc04b5edd52714f7330d045

  • SSDEEP

    98304:pdAPrGpha6grLZ4tJS6NQSBEgR8SF8k2nV3S:EzGphk4tJSIQHuXuV3S

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1252696978039636130/g9z0GlomdTtoSV1VeuxuDXCQsAVQeamKh882rI82-5MDpkkCU0uWJpi6P8B7E9BYLsUu

Targets

    • Target

      2024-06-27_73c265ce417e5a4d23c841f2c02d5956_ngrbot_poet-rat_sliver_snatch

    • Size

      9.5MB

    • MD5

      73c265ce417e5a4d23c841f2c02d5956

    • SHA1

      902c82c28a7f09f42d14c69bc0c50e17f037698b

    • SHA256

      cc208b61c6aa312b4d2321f0397423c9b19a271f3b0753a8d0c2e020c73d10ca

    • SHA512

      6d4beac332adc5f8df96aa2fb99c106e1cc1ee24a003b19305de9ffec0077ed7c0d539742662016f5f804fd9cadfa108c5e2e90e1bc04b5edd52714f7330d045

    • SSDEEP

      98304:pdAPrGpha6grLZ4tJS6NQSBEgR8SF8k2nV3S:EzGphk4tJSIQHuXuV3S

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks