General

  • Target

    entropy.exe

  • Size

    14.2MB

  • Sample

    240630-kwfdjavhlg

  • MD5

    af1ab5ff4b6616672b98ee5258de742e

  • SHA1

    5afe6e93e79dba341cbd1819620ea357aea0c081

  • SHA256

    cf700102d84659bb638a5a3e5e5a4e56a531d8bd6a963756168abba5318e868d

  • SHA512

    aa83ea46bed7ecdb370a0e7eeb49371cb502e27b8ee2f89d9cd8938aa4a695796d3eb361acf48cefcc75674ab722c2bec58d5421343a3595e5309b08a34805ae

  • SSDEEP

    196608:6WJafoL/tUoTX4ZgbX1yfvjS6tLb6qD6rhZyUvXCKxbdfw:6Wsfm/lbX1WjS6F6rhcU6KxZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1256895933057208391/JAbpMTGKr8zp6Y6FOdgpyDyBziX_sUjIHgzVb28cBdxyYsUThLl6pGPEcDd4g-PbwPYr

Targets

    • Target

      entropy.exe

    • Size

      14.2MB

    • MD5

      af1ab5ff4b6616672b98ee5258de742e

    • SHA1

      5afe6e93e79dba341cbd1819620ea357aea0c081

    • SHA256

      cf700102d84659bb638a5a3e5e5a4e56a531d8bd6a963756168abba5318e868d

    • SHA512

      aa83ea46bed7ecdb370a0e7eeb49371cb502e27b8ee2f89d9cd8938aa4a695796d3eb361acf48cefcc75674ab722c2bec58d5421343a3595e5309b08a34805ae

    • SSDEEP

      196608:6WJafoL/tUoTX4ZgbX1yfvjS6tLb6qD6rhZyUvXCKxbdfw:6Wsfm/lbX1WjS6F6rhcU6KxZo

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks