General

  • Target

    main.exe

  • Size

    14.2MB

  • Sample

    240707-mhc3cszblk

  • MD5

    a7ff933d1bfb48bbf39b5e8807145569

  • SHA1

    a966d06fbeb23c39f09a7ee7251088ec3c46dcbc

  • SHA256

    0b0e369545a120edd970764bc00967592840e824a985bc0939831a7f4e8e08b0

  • SHA512

    8a207f6630a4e01b80e0024be473f2787a29f34e8b92dcf05a997e5bb28dd6e98be1ef064e468bc6727e2f82c986b283d0dd953c040f33763853e9a4e5fecde4

  • SSDEEP

    196608:zQHHeieBRR+flfkA/BuVIbWrXi+DC/g+Pgb44m10Yda3BoI:zeHeNM/BXWrS9IqgcZ1ld8B

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1259455200851263528/WjTP7hRdsg9AYUt9Ne5yCsuzpPfcgbf_TXvjDqQyFr_y78pLqaKoKPUt0PJEm49lU8Kn

Targets

    • Target

      main.exe

    • Size

      14.2MB

    • MD5

      a7ff933d1bfb48bbf39b5e8807145569

    • SHA1

      a966d06fbeb23c39f09a7ee7251088ec3c46dcbc

    • SHA256

      0b0e369545a120edd970764bc00967592840e824a985bc0939831a7f4e8e08b0

    • SHA512

      8a207f6630a4e01b80e0024be473f2787a29f34e8b92dcf05a997e5bb28dd6e98be1ef064e468bc6727e2f82c986b283d0dd953c040f33763853e9a4e5fecde4

    • SSDEEP

      196608:zQHHeieBRR+flfkA/BuVIbWrXi+DC/g+Pgb44m10Yda3BoI:zeHeNM/BXWrS9IqgcZ1ld8B

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks