General

  • Target

    Tweaks.exe

  • Size

    9.5MB

  • Sample

    240822-j7q4qswhnb

  • MD5

    4fbe55e3f7e5ff9681998687690a72f2

  • SHA1

    2ba2e3d31379e85f3fccc24e217df465d0093596

  • SHA256

    f59a429ac78e9623a311a3395fbc8c60cf4280284885fbf36e78aa0ba0ac3449

  • SHA512

    10f3789c9a37dc307ce987975f349a1d3fa885ffd49b3df23b525d637041de4290a7dc73b5d61089c5329c0630f727e1642944b3ca450d1a4ba690395235dc27

  • SSDEEP

    98304:PPlSsz0vq91ncrORvs0SSK2g8RwTEplESF8S2jC:4e0vqvKes0SSvgeplv2jC

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1238890599671922728/_Ew7qYxQvd4gs60M5mU_TCHyMFIjkeWgmJqU3DYV2s41jKu7-k8S_wK7m04O0GmoRsRV

Targets

    • Target

      Tweaks.exe

    • Size

      9.5MB

    • MD5

      4fbe55e3f7e5ff9681998687690a72f2

    • SHA1

      2ba2e3d31379e85f3fccc24e217df465d0093596

    • SHA256

      f59a429ac78e9623a311a3395fbc8c60cf4280284885fbf36e78aa0ba0ac3449

    • SHA512

      10f3789c9a37dc307ce987975f349a1d3fa885ffd49b3df23b525d637041de4290a7dc73b5d61089c5329c0630f727e1642944b3ca450d1a4ba690395235dc27

    • SSDEEP

      98304:PPlSsz0vq91ncrORvs0SSK2g8RwTEplESF8S2jC:4e0vqvKes0SSvgeplv2jC

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks