General

  • Target

    2024-06-27_d32b6497f96085710fd6a1ad10e82330_ngrbot_poet-rat_snatch

  • Size

    9.3MB

  • Sample

    240627-ry5jrswand

  • MD5

    d32b6497f96085710fd6a1ad10e82330

  • SHA1

    11af8afa2f63fd797e6dbe306ea8181c3480119a

  • SHA256

    429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712

  • SHA512

    e6eb4ec19ad1d3f813028428b81fc931bd6739845958b541c2b70425bed553910467c29df6ccdc0d6fb9cc30cca91491e632bb30e5cf38a2109b30dc9e014b2f

  • SSDEEP

    98304:wsGLMqMUzFeUoGgcmmPsWvpIqGEV6wKIii8HlD+:EBMUzQyPsWvCqjsfD

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1254543345703977021/GGEp1kTIdcnrlXbkstceRTKYL1MjeavIS4CYW77UE3k75CymaXcXytUfkZVnLNW1d_wt

Targets

    • Target

      2024-06-27_d32b6497f96085710fd6a1ad10e82330_ngrbot_poet-rat_snatch

    • Size

      9.3MB

    • MD5

      d32b6497f96085710fd6a1ad10e82330

    • SHA1

      11af8afa2f63fd797e6dbe306ea8181c3480119a

    • SHA256

      429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712

    • SHA512

      e6eb4ec19ad1d3f813028428b81fc931bd6739845958b541c2b70425bed553910467c29df6ccdc0d6fb9cc30cca91491e632bb30e5cf38a2109b30dc9e014b2f

    • SSDEEP

      98304:wsGLMqMUzFeUoGgcmmPsWvpIqGEV6wKIii8HlD+:EBMUzQyPsWvCqjsfD

    • Skuld stealer

      An info stealer written in Go lang.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing possible sandbox system UUIDs

    • Detects executables referencing virtualization MAC addresses

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks