Resubmissions

02/09/2024, 19:25

240902-x4xzrswajn 10

02/09/2024, 19:25

240902-x4w3gawhpg 10

02/09/2024, 16:59

240902-vhf31svfnf 10

General

  • Target

    skuld.exe

  • Size

    1.6MB

  • Sample

    240902-x4xzrswajn

  • MD5

    b319710e05e8dffcc93202f1ef0cb29b

  • SHA1

    b4f95673a35b3d39aaeb5483069d5b2b684b1683

  • SHA256

    55d7fbbd368d2124ecd6a50f7c51920861691dab1d38216a4d226a3ae18d72b0

  • SHA512

    881b8b566267fef077ba91c0c6c217af37fb56f8a412b8c1acf7cfc3f84b100ce4ea8d9579c44e5e0f656f71893c2622a69f92b9a4be4f2fc1e8a552b52145be

  • SSDEEP

    49152:VcTq24GjdGSiqkqXfd+/9AqYanieKdYH:V9EjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1279926585402593512/-p7sFnb_2x6CbCygjElBC0Haj-3_Y2RxDPvXsumD8jWDE7C7BvP3uhfi8a5Z45S9Whkt

Targets

    • Target

      skuld.exe

    • Size

      1.6MB

    • MD5

      b319710e05e8dffcc93202f1ef0cb29b

    • SHA1

      b4f95673a35b3d39aaeb5483069d5b2b684b1683

    • SHA256

      55d7fbbd368d2124ecd6a50f7c51920861691dab1d38216a4d226a3ae18d72b0

    • SHA512

      881b8b566267fef077ba91c0c6c217af37fb56f8a412b8c1acf7cfc3f84b100ce4ea8d9579c44e5e0f656f71893c2622a69f92b9a4be4f2fc1e8a552b52145be

    • SSDEEP

      49152:VcTq24GjdGSiqkqXfd+/9AqYanieKdYH:V9EjdGSiqkqXf0FLYW

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks