General

  • Target

    2024-08-20_9f0b528a30577357486f977f42abd77d_ngrbot_poet-rat_snatch

  • Size

    9.9MB

  • Sample

    240820-xd9wmsxfjg

  • MD5

    9f0b528a30577357486f977f42abd77d

  • SHA1

    30183b809abfd1af3d707ba7f1297ecd71c55f0a

  • SHA256

    bbe1ad77dc6e0a118b0ec669f65262111948fda44696cde2553e9b3a24e50b3c

  • SHA512

    01059ec6f41a7b7f9bfbddec33be959804f34fd246344b72df1b2bf4d280ec87e04dc923803ae4b519f4c9cbf5e281e1ba689f9c3f42f496f1edb7976f6768f4

  • SSDEEP

    98304:oYUX9bixSlmyCU6DLK7i6IgN78IUEWICafZmyjsEEj2:oPbixSlcS7i6Is73tj0j2

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1275116869468164116/6FWOcOx6ZpiIautNkCsRdFkZql72kCz4eplDi1NpBFs_OeivYEG1v9zPmxfufyY9syvu

Targets

    • Target

      2024-08-20_9f0b528a30577357486f977f42abd77d_ngrbot_poet-rat_snatch

    • Size

      9.9MB

    • MD5

      9f0b528a30577357486f977f42abd77d

    • SHA1

      30183b809abfd1af3d707ba7f1297ecd71c55f0a

    • SHA256

      bbe1ad77dc6e0a118b0ec669f65262111948fda44696cde2553e9b3a24e50b3c

    • SHA512

      01059ec6f41a7b7f9bfbddec33be959804f34fd246344b72df1b2bf4d280ec87e04dc923803ae4b519f4c9cbf5e281e1ba689f9c3f42f496f1edb7976f6768f4

    • SSDEEP

      98304:oYUX9bixSlmyCU6DLK7i6IgN78IUEWICafZmyjsEEj2:oPbixSlcS7i6Is73tj0j2

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks