General

  • Target

    https://mega.nz/file/JLtQ2IyA#lLkRLj-vkg_SlEzeRpogGn_bG9grIXlqdi8889qeTDM

  • Sample

    240928-n7nqtsvdpj

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1288587368357691492/f6mEc_FzE-0rWvSFgK4IhjmpgbSQPZiB68NsOLb9EE3BfoQbAE6r4kjnh-Luc4aVRpR4

Targets

    • Target

      https://mega.nz/file/JLtQ2IyA#lLkRLj-vkg_SlEzeRpogGn_bG9grIXlqdi8889qeTDM

    • Skuld stealer

      An info stealer written in Go lang.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks