General

  • Target

    skuld.exe

  • Size

    9.5MB

  • Sample

    240710-hxwe2awanh

  • MD5

    f7f10a00deb0ab1fdaaaaa46b419d22e

  • SHA1

    ef9ba9542916fc2ec05afca4e09af160eaa048a8

  • SHA256

    78d8899fc23c961b27e44d55515181b7fcec9a4f186f29dc426529577f99231a

  • SHA512

    acb630544991781f6867ebefd9a77ab914d5f8535cd5954cc4796d459358ba2328e237c46b09d2cd1398fd46b0d2805f6a0ff7db2ece022ae3581aa53efc5b08

  • SSDEEP

    98304:Lnz9pKBZNb1lIipU10RSOMRY0WEOfq4Wvtvf:HzuZNa10RS9RY0TOf6vf

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1260492404793016371/Zig61iWHqJTUy79C0aMh1FKy2gZZb-OtHhif_DUGV6l6k33Y6xuyUvmafyZnUBJw-6kg

Targets

    • Target

      skuld.exe

    • Size

      9.5MB

    • MD5

      f7f10a00deb0ab1fdaaaaa46b419d22e

    • SHA1

      ef9ba9542916fc2ec05afca4e09af160eaa048a8

    • SHA256

      78d8899fc23c961b27e44d55515181b7fcec9a4f186f29dc426529577f99231a

    • SHA512

      acb630544991781f6867ebefd9a77ab914d5f8535cd5954cc4796d459358ba2328e237c46b09d2cd1398fd46b0d2805f6a0ff7db2ece022ae3581aa53efc5b08

    • SSDEEP

      98304:Lnz9pKBZNb1lIipU10RSOMRY0WEOfq4Wvtvf:HzuZNa10RS9RY0TOf6vf

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks