General

  • Target

    trolled.exe

  • Size

    4.3MB

  • Sample

    240628-dx96za1flk

  • MD5

    e24cc98957c91dabed02cf84e47b8278

  • SHA1

    00607cff2e6d37b6f271f5e5f8794024814722ee

  • SHA256

    6f819a3dbe5ac75261f157c14035baf0f72bf93033c12e581def1a4cdf9f8039

  • SHA512

    aafca528c9ca2f4e756df04e0b95862cd872b712fe5c3138752d9f65de90f340423d7bab976d9c6a1d890118c720026a9d8b9a229d4dee78dc02d6595f31cc41

  • SSDEEP

    98304:pIgu5JSgwY2bb+YIqdhoBmoziggpNamZTHwwYFiFN:pVu/SSE6YboBmo23KmZTHwwN

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1256063120926052463/-iFGknjVKFXSNv3DZWbEqQQxHdmFRgLmT1KDCJ79ELk0eZPk3sQv7UfngRseF16uBUN5

Targets

    • Target

      trolled.exe

    • Size

      4.3MB

    • MD5

      e24cc98957c91dabed02cf84e47b8278

    • SHA1

      00607cff2e6d37b6f271f5e5f8794024814722ee

    • SHA256

      6f819a3dbe5ac75261f157c14035baf0f72bf93033c12e581def1a4cdf9f8039

    • SHA512

      aafca528c9ca2f4e756df04e0b95862cd872b712fe5c3138752d9f65de90f340423d7bab976d9c6a1d890118c720026a9d8b9a229d4dee78dc02d6595f31cc41

    • SSDEEP

      98304:pIgu5JSgwY2bb+YIqdhoBmoziggpNamZTHwwYFiFN:pVu/SSE6YboBmo23KmZTHwwN

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Class file contains resources related to AdWind

    • Skuld stealer

      An info stealer written in Go lang.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks