General

  • Target

    skuld.exe

  • Size

    9.5MB

  • Sample

    240725-pamypsxfpq

  • MD5

    d6d78d86da04b61384b653485d8a8ffa

  • SHA1

    7fe7eb5c1b9a84a7e1ce24af752249eb4175e146

  • SHA256

    b15615a99e9d626b6fa6851babe8ea611b7f061e3fe1e4848f771c2739e0c791

  • SHA512

    19573f5968dae3d044b67c13f0fc93cca74aac225e12a796b297ba966dded2bfd2fd3269570bf0a9fa1dc489aaa0e66b6e76ee6e635f9e751c4c43de18eede2a

  • SSDEEP

    98304:20W/mwd8vYm5ics/QW6cE1KcD/EnZPgIWJFbm:kPuvYLT6cE1VDcnMFbm

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1266003497724411999/G9HI_cLJhyh9_3ennYmWyN-uYwn1-cWH_IdV934mQJQfODbv1E7G6E1MlCzsfZnExEvN

Targets

    • Target

      skuld.exe

    • Size

      9.5MB

    • MD5

      d6d78d86da04b61384b653485d8a8ffa

    • SHA1

      7fe7eb5c1b9a84a7e1ce24af752249eb4175e146

    • SHA256

      b15615a99e9d626b6fa6851babe8ea611b7f061e3fe1e4848f771c2739e0c791

    • SHA512

      19573f5968dae3d044b67c13f0fc93cca74aac225e12a796b297ba966dded2bfd2fd3269570bf0a9fa1dc489aaa0e66b6e76ee6e635f9e751c4c43de18eede2a

    • SSDEEP

      98304:20W/mwd8vYm5ics/QW6cE1KcD/EnZPgIWJFbm:kPuvYLT6cE1VDcnMFbm

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks