General

  • Target

    6da17f77e11453d95d8962dab6a41640N.exe

  • Size

    9.5MB

  • Sample

    240911-g9sn8sxfme

  • MD5

    6da17f77e11453d95d8962dab6a41640

  • SHA1

    7b8006821fe8dcc118d48a3fac8c97c689e8aa06

  • SHA256

    655ad7717506d68940890173ed818a6897bbbaf636fc91986f5c0d86434f93d6

  • SHA512

    a1c4ab5acdfc44838ea63ceaa5b5f551a3b47094b5678116b8452d32259fd1186c918946bd3cda5292b60762fb90b7a6003796583e7b038b87e6372f19fb2cc5

  • SSDEEP

    98304:hlFawepI0uNJ8r54t9wTgqUoEgG8nSF8h2nE3:xvepI0l4t9w8qev83uE3

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1248365501479129140/HDryYUbu4RUAqQONEi2MyIywCxRLC51WVKEynbpE5XT-5L-LCFDvFPkqZEIn4pyYIcbf

Targets

    • Target

      6da17f77e11453d95d8962dab6a41640N.exe

    • Size

      9.5MB

    • MD5

      6da17f77e11453d95d8962dab6a41640

    • SHA1

      7b8006821fe8dcc118d48a3fac8c97c689e8aa06

    • SHA256

      655ad7717506d68940890173ed818a6897bbbaf636fc91986f5c0d86434f93d6

    • SHA512

      a1c4ab5acdfc44838ea63ceaa5b5f551a3b47094b5678116b8452d32259fd1186c918946bd3cda5292b60762fb90b7a6003796583e7b038b87e6372f19fb2cc5

    • SSDEEP

      98304:hlFawepI0uNJ8r54t9wTgqUoEgG8nSF8h2nE3:xvepI0l4t9w8qev83uE3

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks