General

  • Target

    main.exe

  • Size

    9.5MB

  • Sample

    240628-s9tgbayekm

  • MD5

    0577222f4607d307dbd8e296bfba4bcc

  • SHA1

    cc99671a69c02c65a9e65683215eff9ec4bccf24

  • SHA256

    fa68fb7b9b57f1ad358e829acee0b7db926d78a5f5a4434837fa96b4653c2cb7

  • SHA512

    709cdbf8ac69d1aa0b4cdaf390278e15d71e07f8df2557f5c143580917ae23060b307f8c197e5fb7c49071ecdad63f6226da9bd510069a6c36a0ba70ed3e9dab

  • SSDEEP

    98304:bV5Y4P6vQBpwXgOlx8UJEZMFdEMaMFQvpI3:sW6vQ8d8UJE+FOMKpI3

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1255141785198526518/HbSOi96D9xFWcHRfLUc1hVxDYiJ62EQpodIyKyp_rqp3Dh_0SCxyj3iTrpm92a_OBpFr

Targets

    • Target

      main.exe

    • Size

      9.5MB

    • MD5

      0577222f4607d307dbd8e296bfba4bcc

    • SHA1

      cc99671a69c02c65a9e65683215eff9ec4bccf24

    • SHA256

      fa68fb7b9b57f1ad358e829acee0b7db926d78a5f5a4434837fa96b4653c2cb7

    • SHA512

      709cdbf8ac69d1aa0b4cdaf390278e15d71e07f8df2557f5c143580917ae23060b307f8c197e5fb7c49071ecdad63f6226da9bd510069a6c36a0ba70ed3e9dab

    • SSDEEP

      98304:bV5Y4P6vQBpwXgOlx8UJEZMFdEMaMFQvpI3:sW6vQ8d8UJE+FOMKpI3

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks