General

  • Target

    Virtual.exe

  • Size

    9.5MB

  • Sample

    240720-eyel5awcnk

  • MD5

    9b1daa6658805e529507b156c38b66bc

  • SHA1

    723ac528242dd7fc326b05c05d01f31cff6e8ce3

  • SHA256

    b67152ff3c406d1341542a941ff89e5aefefea93a8cf93837325d7f5fce76616

  • SHA512

    ab175d7b12a56bc4123970b9850364745fae8c5e221ca29c9ab7697798f6043361e143b42366bd5d0974a602572711c56323e8be8b7f7435d204978de2ce0e66

  • SSDEEP

    98304:4jNhw+CwCA27YvY33ocXIj5FTTGEg57F/Fz2hIr:0C+CwCV3ocXg5FTTjghiIr

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1262926533543067740/XBJE1nKhvEw7wJqFaXOEJmKXk_1awtk_zBZiDb8iqvHxjbAh7BNsQaHPn0nUd07PJWN_

Targets

    • Target

      Virtual.exe

    • Size

      9.5MB

    • MD5

      9b1daa6658805e529507b156c38b66bc

    • SHA1

      723ac528242dd7fc326b05c05d01f31cff6e8ce3

    • SHA256

      b67152ff3c406d1341542a941ff89e5aefefea93a8cf93837325d7f5fce76616

    • SHA512

      ab175d7b12a56bc4123970b9850364745fae8c5e221ca29c9ab7697798f6043361e143b42366bd5d0974a602572711c56323e8be8b7f7435d204978de2ce0e66

    • SSDEEP

      98304:4jNhw+CwCA27YvY33ocXIj5FTTGEg57F/Fz2hIr:0C+CwCV3ocXg5FTTjghiIr

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks