General

  • Target

    skuld.exe

  • Size

    9.5MB

  • Sample

    240628-hqhwcswgjh

  • MD5

    22216d85e929d3537d5e0c323e0e88db

  • SHA1

    72e75f35acfa36dc3e28c16ecfcca46f335c7d74

  • SHA256

    f06335e29583075184a183ab4346b02966d85ea83c63197cf59ee8b1dd72a149

  • SHA512

    319e14b6b24707530ecf1cae601f14b8b5ff3a36a4aa8509c100b7b157fa58e4936457d6306e6bb70a1993fdfc2ca8763f754058498c8ebdddf84fd8aaf7999b

  • SSDEEP

    98304:z0uCF1r4MA99QQjCvVwPIieO7XuiEeszsFgLxUf6:BEr4MAQ3wPIiemXuveszWf

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1256088784949215303/WbNGmjP1oWYHf73DLWcGmirMGggTyKkhmk7TEi81oeSTOQ3ZMo631rf3-QXvJw6dp6pf

Targets

    • Target

      skuld.exe

    • Size

      9.5MB

    • MD5

      22216d85e929d3537d5e0c323e0e88db

    • SHA1

      72e75f35acfa36dc3e28c16ecfcca46f335c7d74

    • SHA256

      f06335e29583075184a183ab4346b02966d85ea83c63197cf59ee8b1dd72a149

    • SHA512

      319e14b6b24707530ecf1cae601f14b8b5ff3a36a4aa8509c100b7b157fa58e4936457d6306e6bb70a1993fdfc2ca8763f754058498c8ebdddf84fd8aaf7999b

    • SSDEEP

      98304:z0uCF1r4MA99QQjCvVwPIieO7XuiEeszsFgLxUf6:BEr4MAQ3wPIiemXuveszWf

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks