General

  • Target

    2024-07-06_cf96d1fe38389340a7bd6f25217b705a_ngrbot_poet-rat_snatch

  • Size

    9.5MB

  • Sample

    240706-ywb8rstgmc

  • MD5

    cf96d1fe38389340a7bd6f25217b705a

  • SHA1

    ac519311c71a14f076fb48e8dea1744ef4ff747f

  • SHA256

    5ab34085e73ef9e3075544da3ce29acff67f108ab6a710ffcf385351d627d839

  • SHA512

    30ee3f6f37d20fd1bc934902a9efd1b72f2ca9164cdd46658531f1f49d7ace1ecdbe4da8c31316738a56a91500329139942f19eaaf48046934b13470d5fce9d2

  • SSDEEP

    98304:3DmUoFpgdugturl7vagvw3ceEDfCTwp51T/h:KZFpgd27vagI3WDV/

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1256865196069228615/QxBVP3EAM1JfTSfEhMwT_EexduQvdx1myuvzzU783TE_HbtKV3C_Y3TRq6y7AyBo5uRV

Targets

    • Target

      2024-07-06_cf96d1fe38389340a7bd6f25217b705a_ngrbot_poet-rat_snatch

    • Size

      9.5MB

    • MD5

      cf96d1fe38389340a7bd6f25217b705a

    • SHA1

      ac519311c71a14f076fb48e8dea1744ef4ff747f

    • SHA256

      5ab34085e73ef9e3075544da3ce29acff67f108ab6a710ffcf385351d627d839

    • SHA512

      30ee3f6f37d20fd1bc934902a9efd1b72f2ca9164cdd46658531f1f49d7ace1ecdbe4da8c31316738a56a91500329139942f19eaaf48046934b13470d5fce9d2

    • SSDEEP

      98304:3DmUoFpgdugturl7vagvw3ceEDfCTwp51T/h:KZFpgd27vagI3WDV/

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks