General

  • Target

    skuld.exe

  • Size

    9.5MB

  • Sample

    240725-kjtemaycrr

  • MD5

    a2f0ba384def6f6c6edac90cb7d803a9

  • SHA1

    2dbbae06b9130e673dc191dc01af2dff33cf8863

  • SHA256

    54afe2da6a69255732fe076ee50bdc13219eeb6b5d5e07e5273b41dcca68fab2

  • SHA512

    f7f6e0d31b87f3155f254e58dfdd85aaaaa44bbc1f6499a82b4b1e4401dd35ab62ca0d7c67c8a1b99cce14d6dadd640f2a146a8633663b6c6ce016173bdcf886

  • SSDEEP

    98304:Df9fEgwfbWcoQbrd3o0VqzYjRfEBN7F/IGGI/:5sFfbL3o0VGYjR8BDGI/

Malware Config

Targets

    • Target

      skuld.exe

    • Size

      9.5MB

    • MD5

      a2f0ba384def6f6c6edac90cb7d803a9

    • SHA1

      2dbbae06b9130e673dc191dc01af2dff33cf8863

    • SHA256

      54afe2da6a69255732fe076ee50bdc13219eeb6b5d5e07e5273b41dcca68fab2

    • SHA512

      f7f6e0d31b87f3155f254e58dfdd85aaaaa44bbc1f6499a82b4b1e4401dd35ab62ca0d7c67c8a1b99cce14d6dadd640f2a146a8633663b6c6ce016173bdcf886

    • SSDEEP

      98304:Df9fEgwfbWcoQbrd3o0VqzYjRfEBN7F/IGGI/:5sFfbL3o0VGYjR8BDGI/

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks