General
-
Target
skuld.exe
-
Size
1.6MB
-
Sample
240902-x4xzrswajn
-
MD5
b319710e05e8dffcc93202f1ef0cb29b
-
SHA1
b4f95673a35b3d39aaeb5483069d5b2b684b1683
-
SHA256
55d7fbbd368d2124ecd6a50f7c51920861691dab1d38216a4d226a3ae18d72b0
-
SHA512
881b8b566267fef077ba91c0c6c217af37fb56f8a412b8c1acf7cfc3f84b100ce4ea8d9579c44e5e0f656f71893c2622a69f92b9a4be4f2fc1e8a552b52145be
-
SSDEEP
49152:VcTq24GjdGSiqkqXfd+/9AqYanieKdYH:V9EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
skuld.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1279926585402593512/-p7sFnb_2x6CbCygjElBC0Haj-3_Y2RxDPvXsumD8jWDE7C7BvP3uhfi8a5Z45S9Whkt
Targets
-
-
Target
skuld.exe
-
Size
1.6MB
-
MD5
b319710e05e8dffcc93202f1ef0cb29b
-
SHA1
b4f95673a35b3d39aaeb5483069d5b2b684b1683
-
SHA256
55d7fbbd368d2124ecd6a50f7c51920861691dab1d38216a4d226a3ae18d72b0
-
SHA512
881b8b566267fef077ba91c0c6c217af37fb56f8a412b8c1acf7cfc3f84b100ce4ea8d9579c44e5e0f656f71893c2622a69f92b9a4be4f2fc1e8a552b52145be
-
SSDEEP
49152:VcTq24GjdGSiqkqXfd+/9AqYanieKdYH:V9EjdGSiqkqXf0FLYW
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1