General
-
Target
https://mega.nz/file/JLtQ2IyA#lLkRLj-vkg_SlEzeRpogGn_bG9grIXlqdi8889qeTDM
-
Sample
240928-n7nqtsvdpj
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/JLtQ2IyA#lLkRLj-vkg_SlEzeRpogGn_bG9grIXlqdi8889qeTDM
Resource
win10v2004-20240802-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1288587368357691492/f6mEc_FzE-0rWvSFgK4IhjmpgbSQPZiB68NsOLb9EE3BfoQbAE6r4kjnh-Luc4aVRpR4
Targets
-
-
Target
https://mega.nz/file/JLtQ2IyA#lLkRLj-vkg_SlEzeRpogGn_bG9grIXlqdi8889qeTDM
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1