General

  • Target

    2024-08-19_ae066bde3f02e0d9c74fcd44c48e39d1_ngrbot_poet-rat_snatch

  • Size

    14.8MB

  • Sample

    240819-qwn9bszgml

  • MD5

    ae066bde3f02e0d9c74fcd44c48e39d1

  • SHA1

    787f985a82ff0e2850a889f39902c2d34ff9d865

  • SHA256

    c5cd15d509b07a776497ce0db89e663b29ccb1528645a6bcff3779659b0d9443

  • SHA512

    984455204b2321baf2c121bac85a229bb7d6f863c2d5b078133d2f4e324360c76a1a30d011e99ba3524884f6990c96c1954e096fedfa570b8692f76e27183bb5

  • SSDEEP

    196608:r4K1mV3IyCoCMoKKeTeEjVUmwig7+4pSJxOEj9sSygLw:rmVY8Ti6JxOE9LL

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1271308116566474792/F4FkKEXvH1lVIn19orALTp7T6W6PWyLg2pTtgmAymDmSHN76JdmWrfW9tkKdzyKIgVjM

Targets

    • Target

      2024-08-19_ae066bde3f02e0d9c74fcd44c48e39d1_ngrbot_poet-rat_snatch

    • Size

      14.8MB

    • MD5

      ae066bde3f02e0d9c74fcd44c48e39d1

    • SHA1

      787f985a82ff0e2850a889f39902c2d34ff9d865

    • SHA256

      c5cd15d509b07a776497ce0db89e663b29ccb1528645a6bcff3779659b0d9443

    • SHA512

      984455204b2321baf2c121bac85a229bb7d6f863c2d5b078133d2f4e324360c76a1a30d011e99ba3524884f6990c96c1954e096fedfa570b8692f76e27183bb5

    • SSDEEP

      196608:r4K1mV3IyCoCMoKKeTeEjVUmwig7+4pSJxOEj9sSygLw:rmVY8Ti6JxOE9LL

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks