General

  • Target

    entropy.rar

  • Size

    23.2MB

  • Sample

    240914-3qpdcsterf

  • MD5

    15ec05cdc176dbab41a59bbc6669384b

  • SHA1

    1fe7aad71aa5fbab853ead759281ce9ac58458c0

  • SHA256

    5b49adb0e97c0c26a2e391c0e0f452ab33f26e070c053c85c5e01bbeb2a2bb34

  • SHA512

    9ab1186695c896892d719d422644e883abd89bde40fad2d3ce429f5419d8c9fcea4c5574bff0baa2e2818cbf2846c4962ddbf15d3a8a4e9ac0121110d83fb4bd

  • SSDEEP

    393216:upm9b8IdRGA6HVL70qvAP56u3jaqAc6YVb0a7+xQwtfVGCCa0Oo4jq/eCp7l3:Am2L70fR6uTaBYFnJCM9a0Oo4jqf3

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1284129975246524467/2KIQ0y_EKuR-2Ekg7DykajQRxBZ2HFJZflNz40zZOjAKjmmmVSa64WpWtZe6io39h_Dl

Targets

    • Target

      entropy/entropy.dll

    • Size

      177KB

    • MD5

      d3375b53754f3c8deaaf436737e25007

    • SHA1

      2cf3278e9179effc39826141fd5add61fd4e93d9

    • SHA256

      f4865f3256200d374367ef844a1f10d83748d2be2f0fbc50052020960977fd2d

    • SHA512

      3a25e45613d710de33a8d80a8b04e6a8c35b3ba6e26ac8c6b0f5a48cde025b51e71269d7e2a2cf1b9d8adeecf1b500e51e7f0877ad8a6cbf66f54db36aa5c7cb

    • SSDEEP

      3072:B8X8PLYlycIHp6pgoUUctnRKNJsPLPRdVb3pr9o/oIGQHMdVA0Ya:B+8ztupyU6PBbNC/zGQHMdGa

    Score
    1/10
    • Target

      entropy/entropy.exe

    • Size

      14.2MB

    • MD5

      398fa5adc59c205bb8f15f9ba5c8e67a

    • SHA1

      f9c361ccf67754ece3ef4e69bfbed9e16448a3e3

    • SHA256

      5929e86ccecf62ecfc34ce92cfaed3b21471411bd0459ce6d492a960e432710e

    • SHA512

      c4842f34b049be1a7df0faedb9bd7a6e3f2a225fd599435e76e54b54c6c09081e1524c74c851cb5bfe8b48691e26d1d4d82e8c72464be08ff93f0a54c81686f4

    • SSDEEP

      196608:CWJafoL/tUoTX4ZSbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:CWsfm/7bh1lkSFCdTauZo

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Target

      entropy/entropyloader.dll

    • Size

      8.8MB

    • MD5

      9f7288c05669282f9f5f650446283325

    • SHA1

      a9cb48f24fb89c01b69feedaa2d5807331715eb0

    • SHA256

      037e1ef19688f46bf91cc040e2e5127fcb10a14afad7accd7d987d1de4f0c59a

    • SHA512

      60114acba85bca451c826cd545c5e28f06dbe1a6f059fa573a2eed821873c5089983a1d20826b9e5533004fc850e87cffe421b0b115f3e604d5792ca6084c15e

    • SSDEEP

      196608:UmmmmmmmRG6SQEAKW3P1IFsrTYfSXqRqr9PxaZcIBWiopQgWddgKmH0:UmmmmmmmRG6oAPdIF08fSXqkRm4MLddJ

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks