General

  • Target

    type soul boss raid.exe

  • Size

    9.5MB

  • Sample

    240712-xp1gcawdpm

  • MD5

    338be43d4eb4ddf3f97fd44ecf22e4a2

  • SHA1

    a552626b2da157e8a615fe3e0acc5df6d8deafc5

  • SHA256

    5379c819c57795b63262e03ed400995b986f33e4ab6b1bb281572707b154e9fe

  • SHA512

    2becff1e3cd77e205834824e810821ede5a781241394dcfd6f58aff0bf7dd7f23fdbc2d79bc9a4e08dff890a3821399c5ddd6fcca1316083c4a8e9738f2b2d95

  • SSDEEP

    98304:UY/ihXYDH6HgYde3E0gr6T4tE7hSF8R93e:lSXYDgNuE0grC4+7F93e

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1247048491847651388/VfwRIzo2Gqtsne_56GFoCLAYI4dthcnl-cbi1-rToM1VQbGoinIS42n6ri90MWxTi9n6

Targets

    • Target

      type soul boss raid.exe

    • Size

      9.5MB

    • MD5

      338be43d4eb4ddf3f97fd44ecf22e4a2

    • SHA1

      a552626b2da157e8a615fe3e0acc5df6d8deafc5

    • SHA256

      5379c819c57795b63262e03ed400995b986f33e4ab6b1bb281572707b154e9fe

    • SHA512

      2becff1e3cd77e205834824e810821ede5a781241394dcfd6f58aff0bf7dd7f23fdbc2d79bc9a4e08dff890a3821399c5ddd6fcca1316083c4a8e9738f2b2d95

    • SSDEEP

      98304:UY/ihXYDH6HgYde3E0gr6T4tE7hSF8R93e:lSXYDgNuE0grC4+7F93e

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks