General

  • Target

    skuld (1).exe

  • Size

    9.5MB

  • Sample

    240630-w7pl5awakm

  • MD5

    c687ae7e3be528c38d7a00b93e04d332

  • SHA1

    c7f60d1a0eee7a774309b9b60c457b0788cc6cab

  • SHA256

    ef5ba17ab5fdb6a8cbc5dfcad5226b02e3f14c45e04e98080db150965842fd30

  • SHA512

    b0d23b80741b7da1aa47f56d482bd9adca72b4113385bf00c090487470f20a9765eeb853d25c324662f15b4b080ef7f4e37536a08ea5bbfd0eb5766530c7739e

  • SSDEEP

    98304:9nGwRbFvrLPk4GIipU10RSOMRBjLEHpyQWvmjFVf1:IwxFvrt10RS9RBjYHpdVf1

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1257036488672153761/NvDp_1b2nXLy-u8-yrTiFucpasoL2g34R7fCAV1w_Hji_Wd5urWsmS5DdJXMZb_5lbXp

Targets

    • Target

      skuld (1).exe

    • Size

      9.5MB

    • MD5

      c687ae7e3be528c38d7a00b93e04d332

    • SHA1

      c7f60d1a0eee7a774309b9b60c457b0788cc6cab

    • SHA256

      ef5ba17ab5fdb6a8cbc5dfcad5226b02e3f14c45e04e98080db150965842fd30

    • SHA512

      b0d23b80741b7da1aa47f56d482bd9adca72b4113385bf00c090487470f20a9765eeb853d25c324662f15b4b080ef7f4e37536a08ea5bbfd0eb5766530c7739e

    • SSDEEP

      98304:9nGwRbFvrLPk4GIipU10RSOMRBjLEHpyQWvmjFVf1:IwxFvrt10RS9RBjYHpdVf1

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks