General

  • Target

    2024-07-06_15767d56c12becc21502a59355a9c163_ngrbot_poet-rat_snatch

  • Size

    9.5MB

  • Sample

    240706-wess3sxelk

  • MD5

    15767d56c12becc21502a59355a9c163

  • SHA1

    360524f903a06307f32a9fd8ca839da949c75916

  • SHA256

    7cb04b7c094f2f1beb40a7b27136a9ff9c954b3edda52f5de99b31635e50b6db

  • SHA512

    e7faa7034920ed376869548fe2107035d7c24c578961fa2a1317f5f2231b2333668fd475a3b2deaf99fc4e87894f59837d40950f67cdadb4b1b016d0761dc13a

  • SSDEEP

    98304:NzZIWZX0gybHFmOKMW2S6by4ELW/6FQKVVSf:n3501sMW2SiyxqEVVSf

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1258496423444615342/CgJY-4xdm5Ye24oauoByyHTOC86vzjGJvv8cMxKQz03UpkK8RVz4-rL3_dhMIWWysqJ_

Targets

    • Target

      2024-07-06_15767d56c12becc21502a59355a9c163_ngrbot_poet-rat_snatch

    • Size

      9.5MB

    • MD5

      15767d56c12becc21502a59355a9c163

    • SHA1

      360524f903a06307f32a9fd8ca839da949c75916

    • SHA256

      7cb04b7c094f2f1beb40a7b27136a9ff9c954b3edda52f5de99b31635e50b6db

    • SHA512

      e7faa7034920ed376869548fe2107035d7c24c578961fa2a1317f5f2231b2333668fd475a3b2deaf99fc4e87894f59837d40950f67cdadb4b1b016d0761dc13a

    • SSDEEP

      98304:NzZIWZX0gybHFmOKMW2S6by4ELW/6FQKVVSf:n3501sMW2SiyxqEVVSf

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks