General

  • Target

    2024-08-19_bfba78b018578c40661b8edaebc7a49a_ngrbot_poet-rat_snatch

  • Size

    9.9MB

  • Sample

    240819-mxt97azdma

  • MD5

    bfba78b018578c40661b8edaebc7a49a

  • SHA1

    13cba8253d745307199aa7f6e31ad679b7d4aa3e

  • SHA256

    7784b9ccefd4243a5603128c078ac616a1caac87d8d282af6a510955721b7d73

  • SHA512

    25443c6b6a296b457b16bc1a23f795f04f44f0f0e5b0054e185a2ef2084690f42f5a7846be0051d731499cdb1f14d2c5438da9a0f1f1c31d0427aba2c3a95ca2

  • SSDEEP

    98304:/EviWIjraQ4Gzv+igMgiiIHZiBI2ExICafZmyjsEdjY:/gIjraQoCgiiI5iyzQNjY

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1274310705310601280/mWvRBn_rsvC-RnxpWRLcPKGN74ksINchEqeJOneHpp8cvI6Q3Wpnj-dKlj3yi8GmPNOh

Targets

    • Target

      2024-08-19_bfba78b018578c40661b8edaebc7a49a_ngrbot_poet-rat_snatch

    • Size

      9.9MB

    • MD5

      bfba78b018578c40661b8edaebc7a49a

    • SHA1

      13cba8253d745307199aa7f6e31ad679b7d4aa3e

    • SHA256

      7784b9ccefd4243a5603128c078ac616a1caac87d8d282af6a510955721b7d73

    • SHA512

      25443c6b6a296b457b16bc1a23f795f04f44f0f0e5b0054e185a2ef2084690f42f5a7846be0051d731499cdb1f14d2c5438da9a0f1f1c31d0427aba2c3a95ca2

    • SSDEEP

      98304:/EviWIjraQ4Gzv+igMgiiIHZiBI2ExICafZmyjsEdjY:/gIjraQoCgiiI5iyzQNjY

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks