General
-
Target
skuld.exe
-
Size
9.5MB
-
Sample
240630-2tlk7syajb
-
MD5
4527ef40b2543cbfa46d35c25f741dae
-
SHA1
f01565f1b655a840a6a4b1cbc070659014508aee
-
SHA256
99fb0eca4614a74886d2d1221045c9f35b4ac7400488db84fdcebdc6bde2f88e
-
SHA512
ab4b576dbbfdbb8fe4f1b170fbb9de9a484ff89fcdda60df90d524a6e0ab63e6f564cb471424dfad8fea9ef49b17bfe5c4b8ddd7be6997d8ba725d3461da4316
-
SSDEEP
98304:fdWb6aDUMqI03IXN1dsv7FQMEP4KAd4f:A/UMqY1dsvBQlPTf
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1257039082274422896/395iJabK3IVPpIWgS1k1UJ3FAnHY2lWIwRcLWCTN1yTDR63aYdeLgcVrc81Dut5tbfV4
Targets
-
-
Target
skuld.exe
-
Size
9.5MB
-
MD5
4527ef40b2543cbfa46d35c25f741dae
-
SHA1
f01565f1b655a840a6a4b1cbc070659014508aee
-
SHA256
99fb0eca4614a74886d2d1221045c9f35b4ac7400488db84fdcebdc6bde2f88e
-
SHA512
ab4b576dbbfdbb8fe4f1b170fbb9de9a484ff89fcdda60df90d524a6e0ab63e6f564cb471424dfad8fea9ef49b17bfe5c4b8ddd7be6997d8ba725d3461da4316
-
SSDEEP
98304:fdWb6aDUMqI03IXN1dsv7FQMEP4KAd4f:A/UMqY1dsvBQlPTf
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1