Resubmissions

25-07-2024 08:53

240725-ktbbssscrh 10

General

  • Target

    skuld.sfx.exe

  • Size

    3.7MB

  • Sample

    240725-ktbbssscrh

  • MD5

    ab89295610a3a53927f7479c8db9a8a9

  • SHA1

    6060c650d1edcc005982448912fa9a6e18067696

  • SHA256

    c128cf0d1afc230ead203fecf537e8161eb9cc1abd3cfbd7d9cf8def2cb4ae10

  • SHA512

    c2da7a1fc89382bc124f84d9d8150c47db370ecd2ba9d57d80dc0a53eaea6d80f527a22cd6ab1be2b85172f18b840116f821684c7644c8e5f15e53b2d732e1ab

  • SSDEEP

    98304:tWBHStoOEyvuShmCYhCahxI2vCcPUeybvRA5oFO9whPn:EBHSSOZuBC4Ct2vHcrbv18uhP

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1258409018213269555/uCN0wtYxZNzT5QyuDUtPXUdeYkj3blj_Ed2Glmr-iuRbwAZBTP8DYWusQH-_Wx4qwu1t

Targets

    • Target

      skuld.sfx.exe

    • Size

      3.7MB

    • MD5

      ab89295610a3a53927f7479c8db9a8a9

    • SHA1

      6060c650d1edcc005982448912fa9a6e18067696

    • SHA256

      c128cf0d1afc230ead203fecf537e8161eb9cc1abd3cfbd7d9cf8def2cb4ae10

    • SHA512

      c2da7a1fc89382bc124f84d9d8150c47db370ecd2ba9d57d80dc0a53eaea6d80f527a22cd6ab1be2b85172f18b840116f821684c7644c8e5f15e53b2d732e1ab

    • SSDEEP

      98304:tWBHStoOEyvuShmCYhCahxI2vCcPUeybvRA5oFO9whPn:EBHSSOZuBC4Ct2vHcrbv18uhP

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks