General

  • Target

    2024-09-30_2f94073eec9b3fa92bc9106dfec67a46_ngrbot_poet-rat_snatch

  • Size

    14.8MB

  • Sample

    240930-lrdvksshjd

  • MD5

    2f94073eec9b3fa92bc9106dfec67a46

  • SHA1

    1c9e9faabafc8c600e79b9682fb8647d933e7249

  • SHA256

    a36e4f998a9fd480064c002feae5a290bec8f8c84d9f4b8827e94d12ad3cba25

  • SHA512

    6b66e03377a13a52683951f9609dd20d19096d79fd24342f939733692f6b3e5e44bf522d0c32d4d9da68fea33a603a5a811244bfa3a6ca6c3055a69af24c76bd

  • SSDEEP

    196608:zpOO+VK+RY9CnIpElJEMj5zmM0l+KPbZUtxhoVsSygLw:zGVmqJCEaYxhoxLL

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1288095409499148358/f-XnFnAZO39iuEqRQm03JW8tZv95XhynsrZJnx1Rut0s7n5ljiYv_kuZc6xMoyux-Ol9

Targets

    • Target

      2024-09-30_2f94073eec9b3fa92bc9106dfec67a46_ngrbot_poet-rat_snatch

    • Size

      14.8MB

    • MD5

      2f94073eec9b3fa92bc9106dfec67a46

    • SHA1

      1c9e9faabafc8c600e79b9682fb8647d933e7249

    • SHA256

      a36e4f998a9fd480064c002feae5a290bec8f8c84d9f4b8827e94d12ad3cba25

    • SHA512

      6b66e03377a13a52683951f9609dd20d19096d79fd24342f939733692f6b3e5e44bf522d0c32d4d9da68fea33a603a5a811244bfa3a6ca6c3055a69af24c76bd

    • SSDEEP

      196608:zpOO+VK+RY9CnIpElJEMj5zmM0l+KPbZUtxhoVsSygLw:zGVmqJCEaYxhoxLL

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks