General

  • Target

    2024-08-08_983111b5728d2c6fd5e09a1d7f6898cd_ngrbot_poet-rat_snatch

  • Size

    9.5MB

  • Sample

    240809-adb82swgpe

  • MD5

    983111b5728d2c6fd5e09a1d7f6898cd

  • SHA1

    33bbfdfa56fcf9e3f1ac2944b60a3cb84268c0fe

  • SHA256

    73d444230fb762e3ea72b4ea379a82596052a7f47e8b3590f89a2d86cee0e9c0

  • SHA512

    9b01197ca76da9bce7b925aa74a120de52471ba943999ecf666a10f7c43940f3e58a8d1d477da8d0f271412e7e2ab89372ff6319ffa234f11fdc394360a4dac9

  • SSDEEP

    98304:j/8TYFDiwAYLyhnCBvloMQAU78P2qEEyE7F/3z2lIY:4GDiwAuRloMQL78P23EyGyIY

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1270318290333335642/PAwOSD0QXOz5Fy-bzAuuo9ny_eK9BNOAJCawp3AdQ45TNhs20ueZzxO1Sr5s4uzfnt2x

Targets

    • Target

      2024-08-08_983111b5728d2c6fd5e09a1d7f6898cd_ngrbot_poet-rat_snatch

    • Size

      9.5MB

    • MD5

      983111b5728d2c6fd5e09a1d7f6898cd

    • SHA1

      33bbfdfa56fcf9e3f1ac2944b60a3cb84268c0fe

    • SHA256

      73d444230fb762e3ea72b4ea379a82596052a7f47e8b3590f89a2d86cee0e9c0

    • SHA512

      9b01197ca76da9bce7b925aa74a120de52471ba943999ecf666a10f7c43940f3e58a8d1d477da8d0f271412e7e2ab89372ff6319ffa234f11fdc394360a4dac9

    • SSDEEP

      98304:j/8TYFDiwAYLyhnCBvloMQAU78P2qEEyE7F/3z2lIY:4GDiwAuRloMQL78P23EyGyIY

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks