General

  • Target

    skuld.exe

  • Size

    14.2MB

  • Sample

    240630-ktb84avhkg

  • MD5

    daae4b834babdba02134d4732efd453e

  • SHA1

    c4c11e5773d72abecf88a62b13eac7f56083814b

  • SHA256

    d64d84ae15ea5dfa27b3c5f52750c98ebe2c7dd84db5fb4c4b1b2ae6e691961d

  • SHA512

    71187ae5ad27ee02f9fcd4cff9d716a152ce3bc73f9d42fc3e46ee555868e20a9cb0337e408ea5ffa59fbcd01196ce85f953c606022bb46187ec25d616bb942c

  • SSDEEP

    196608:aWJafoL/tUoTX4ZcbX1yfvjS6tLb6qD6rhZyUvXCKxbdfw:aWsfm/JbX1WjS6F6rhcU6KxZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1256850408366805072/x2jhBqkG5nRjLNf7Yy2ji8FT3b3A6xGu7AHz2QklzVo2SpmpCJ5IJJH53vIuMneMeSAl

Targets

    • Target

      skuld.exe

    • Size

      14.2MB

    • MD5

      daae4b834babdba02134d4732efd453e

    • SHA1

      c4c11e5773d72abecf88a62b13eac7f56083814b

    • SHA256

      d64d84ae15ea5dfa27b3c5f52750c98ebe2c7dd84db5fb4c4b1b2ae6e691961d

    • SHA512

      71187ae5ad27ee02f9fcd4cff9d716a152ce3bc73f9d42fc3e46ee555868e20a9cb0337e408ea5ffa59fbcd01196ce85f953c606022bb46187ec25d616bb942c

    • SSDEEP

      196608:aWJafoL/tUoTX4ZcbX1yfvjS6tLb6qD6rhZyUvXCKxbdfw:aWsfm/JbX1WjS6F6rhcU6KxZo

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks