General

  • Target

    skuld.sfx.exe

  • Size

    3.7MB

  • Sample

    240725-mb7ndsshpn

  • MD5

    e07476e550f7c3ccb7f5e30f29a88d05

  • SHA1

    2a1ad24b3cda146a9de84e41f3df017215fa7a72

  • SHA256

    06c02f85d69aa4f5afb0b214f81960fcd30c76766a7d29df79d6637205af7f3c

  • SHA512

    741c1ee74ae84b389cc2fb68b138277c8b9b3dd78bc36e3c6f0e0a322136321a7e4968981d2508714efa346b039bc61042176e37a3efab87ad7efc7b09eafb52

  • SSDEEP

    98304:txMmfMvWN/2VT3rUUxq0mgc3LjqlQUQHFl2zSwi:0Z+OT7JVE/Vl2k

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1264686401501401089/XAi_UkMq6Piek4Byxf_KJY-VIOIPpUoXKEe5FthGsd-Jo_7aylbLmrAPLf0nBSrgFfAx

Targets

    • Target

      skuld.sfx.exe

    • Size

      3.7MB

    • MD5

      e07476e550f7c3ccb7f5e30f29a88d05

    • SHA1

      2a1ad24b3cda146a9de84e41f3df017215fa7a72

    • SHA256

      06c02f85d69aa4f5afb0b214f81960fcd30c76766a7d29df79d6637205af7f3c

    • SHA512

      741c1ee74ae84b389cc2fb68b138277c8b9b3dd78bc36e3c6f0e0a322136321a7e4968981d2508714efa346b039bc61042176e37a3efab87ad7efc7b09eafb52

    • SSDEEP

      98304:txMmfMvWN/2VT3rUUxq0mgc3LjqlQUQHFl2zSwi:0Z+OT7JVE/Vl2k

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks