General
-
Target
skuld.exe
-
Size
9.4MB
-
Sample
240712-a56lza1hlp
-
MD5
fea59955ab0fcc83f00cdae5cc117a01
-
SHA1
9778ae8c8376897ce620bf034449b40f86e6524e
-
SHA256
522d690153d2be80648e7552115f4208b5c00d32669ee9353502bac58a4c7e2c
-
SHA512
00b325c7a57b871c10e7b1be3caad625746a4ab73173a695d3b3c8ad199cc7eeac829d37f49420e80d1759c7bc66b81cc2763e81a9de17e70c2bca76f164ae5f
-
SSDEEP
98304:ERQFK1V4OI3WKF0UULoLkfCzaE3MwTwYH:Xg1V4OEULoLwCT3JH
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1243605362742005904/Nvky9VoL_U2OJkQtz-o56Shh4aTBArCHpjcQqPq9ScLPwWMhvk3UUOoahVRhl20BqJOH
Targets
-
-
Target
skuld.exe
-
Size
9.4MB
-
MD5
fea59955ab0fcc83f00cdae5cc117a01
-
SHA1
9778ae8c8376897ce620bf034449b40f86e6524e
-
SHA256
522d690153d2be80648e7552115f4208b5c00d32669ee9353502bac58a4c7e2c
-
SHA512
00b325c7a57b871c10e7b1be3caad625746a4ab73173a695d3b3c8ad199cc7eeac829d37f49420e80d1759c7bc66b81cc2763e81a9de17e70c2bca76f164ae5f
-
SSDEEP
98304:ERQFK1V4OI3WKF0UULoLkfCzaE3MwTwYH:Xg1V4OEULoLwCT3JH
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1