General

  • Target

    skuld.exe

  • Size

    9.5MB

  • Sample

    240630-j3hxkaycnn

  • MD5

    7dd191e903d61bdd90b8cad94c666369

  • SHA1

    f6c46f0c288d36e93e8f6d390dd66a17b5e579c2

  • SHA256

    0930196a028fe8d4e1726f808b76d2b1c1c68fe69e8c9f49107da7b62bd48361

  • SHA512

    26a8157c8b36339849f86734348d977952f10cbad2e5e072f64915b8e788e4b503ae0aa488cbdf1362406696b9b5e775530da6316a9cd0fc6be1a7ed2fad2c3b

  • SSDEEP

    98304:r8NrVo1/zObl7CbvV5FILXqpYlEb6kF88l19AfE:qW1/zo65FILXMYWbz1ef

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1256850408366805072/x2jhBqkG5nRjLNf7Yy2ji8FT3b3A6xGu7AHz2QklzVo2SpmpCJ5IJJH53vIuMneMeSAl

Targets

    • Target

      skuld.exe

    • Size

      9.5MB

    • MD5

      7dd191e903d61bdd90b8cad94c666369

    • SHA1

      f6c46f0c288d36e93e8f6d390dd66a17b5e579c2

    • SHA256

      0930196a028fe8d4e1726f808b76d2b1c1c68fe69e8c9f49107da7b62bd48361

    • SHA512

      26a8157c8b36339849f86734348d977952f10cbad2e5e072f64915b8e788e4b503ae0aa488cbdf1362406696b9b5e775530da6316a9cd0fc6be1a7ed2fad2c3b

    • SSDEEP

      98304:r8NrVo1/zObl7CbvV5FILXqpYlEb6kF88l19AfE:qW1/zo65FILXMYWbz1ef

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks