General

  • Target

    2024090550ce0fafe706202dd0c7e16dda7d944fpoetratsnatch

  • Size

    9.6MB

  • Sample

    240905-tpps3avamp

  • MD5

    50ce0fafe706202dd0c7e16dda7d944f

  • SHA1

    fe793c1147c6353fa9e23a414859377373f15568

  • SHA256

    14bea45a91e363227b7da42c601342f681e18c121e73d037781b877107ad6d93

  • SHA512

    1dd6391a40baf16206b1dfd4cd6b83e194e642182adc183d3cff18ff1edad1541eac18d814cb2264619f5752ceef4211095d1dbc8941db3cde6a84119d3e6b87

  • SSDEEP

    196608:thWVIBVKULThlN1BZWjdEi3FyfzEhvg5hGmrx11/AkfCaYlZQgslbyVmZDDEE:bW36p

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1280996834520858644/8ic5luXj237Hn5I3NEDbVW6sWOify2Wyt2GZO5-NiXQ25J3KYxfeXzskHtb61vEwpVii

Targets

    • Target

      2024090550ce0fafe706202dd0c7e16dda7d944fpoetratsnatch

    • Size

      9.6MB

    • MD5

      50ce0fafe706202dd0c7e16dda7d944f

    • SHA1

      fe793c1147c6353fa9e23a414859377373f15568

    • SHA256

      14bea45a91e363227b7da42c601342f681e18c121e73d037781b877107ad6d93

    • SHA512

      1dd6391a40baf16206b1dfd4cd6b83e194e642182adc183d3cff18ff1edad1541eac18d814cb2264619f5752ceef4211095d1dbc8941db3cde6a84119d3e6b87

    • SSDEEP

      196608:thWVIBVKULThlN1BZWjdEi3FyfzEhvg5hGmrx11/AkfCaYlZQgslbyVmZDDEE:bW36p

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks