General
-
Target
skuld.exe
-
Size
9.5MB
-
Sample
240629-n9qyzazfmk
-
MD5
cf7bd8fef497cbb7545373bd87659064
-
SHA1
fa0b9b9a9adecbdf2a3d72ec66f7415592df439c
-
SHA256
ac9b264c17e54ea3aff40f6f4ddb474da2c43132a86ddf15809983df47f106d0
-
SHA512
174bd9263ba7a063432a1aa61e0994fbb1cb755213d2eb12d821afa2f9d4a8e49b394f96f5c619974f56845819296ebb7369ca7e147c38cae801c5c2c18040c7
-
SSDEEP
98304:FDmUoFpgdugturl7vagvw3c4EDfCTwp51T/h:kZFpgd27vagI3UDV/
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
skuld.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1256145337744359525/7zwnBhs6wh3MTM_zYSDtpQMk3Wv1RH3XvxhYSsWV07U0r5SfXeHF9snhugyCbuEZIr40
Targets
-
-
Target
skuld.exe
-
Size
9.5MB
-
MD5
cf7bd8fef497cbb7545373bd87659064
-
SHA1
fa0b9b9a9adecbdf2a3d72ec66f7415592df439c
-
SHA256
ac9b264c17e54ea3aff40f6f4ddb474da2c43132a86ddf15809983df47f106d0
-
SHA512
174bd9263ba7a063432a1aa61e0994fbb1cb755213d2eb12d821afa2f9d4a8e49b394f96f5c619974f56845819296ebb7369ca7e147c38cae801c5c2c18040c7
-
SSDEEP
98304:FDmUoFpgdugturl7vagvw3c4EDfCTwp51T/h:kZFpgd27vagI3UDV/
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1