General

  • Target

    Telegram Desktop.exe

  • Size

    310KB

  • Sample

    240721-r9b2latfkd

  • MD5

    d284f1ffcf65941c59498f41de410168

  • SHA1

    404ec1fca6c6b442e2751d90cdf5cadd76395076

  • SHA256

    6bf297bef2431e24bbbbca085f5774593ae2bce6ada433d59259c5608ad37dcb

  • SHA512

    c25381a6b43b06905ab735f8bf21cae045d010c557f936a0aed3e173080f33d1a2eac17a4b129f972e3a4da674ff37c6c0c35c1dd28ac91ffbcd99d8ae4d8d47

  • SSDEEP

    6144:z8JsLcpjzTDDmHayakLkrb4NSarQW82X+t40XIQ:IzxzTDWikLSb4NS7t2X+t40XIQ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://tinyurl.com/mmtffwh6

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1264554977548959744/oC53YCw85zYhcirGtr-tguubwfkNi6K13nKw05hZvFcoP9Rq_6cKfDH030-fMLXLn3RB

Targets

    • Target

      Telegram Desktop.exe

    • Size

      310KB

    • MD5

      d284f1ffcf65941c59498f41de410168

    • SHA1

      404ec1fca6c6b442e2751d90cdf5cadd76395076

    • SHA256

      6bf297bef2431e24bbbbca085f5774593ae2bce6ada433d59259c5608ad37dcb

    • SHA512

      c25381a6b43b06905ab735f8bf21cae045d010c557f936a0aed3e173080f33d1a2eac17a4b129f972e3a4da674ff37c6c0c35c1dd28ac91ffbcd99d8ae4d8d47

    • SSDEEP

      6144:z8JsLcpjzTDDmHayakLkrb4NSarQW82X+t40XIQ:IzxzTDWikLSb4NS7t2X+t40XIQ

    • Skuld stealer

      An info stealer written in Go lang.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks