General

  • Target

    0RMQNB2.vmp.exe

  • Size

    12.6MB

  • Sample

    241013-gx6qbsxalq

  • MD5

    11acc6c6ae233255480dc44f28e907d3

  • SHA1

    58d7c0925ca9415b60ba0e2968720d1f9463d8b8

  • SHA256

    c4e7bcc051993b7478423dda0a744aa005eade7c740bf083f29f430427ee4d14

  • SHA512

    f32d9c674daf720f870fbb75909278fc3cf76c83f7c1ecf196c3cbb72dc43cd330159456a202b67cbf164a31f12737519c55068027be3eb024fe4141669a71cc

  • SSDEEP

    196608:M5y4n51bzDwrAYIqtmDQy/GpoXzT100wK6KXvU11XaAo:MP5hPaAYI8gQy/GpoXz7/Ujno

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1278685696588124283/sHga8EVjouFXXrvPxaHU2YXCRJIVE1RYWbSaVSKowDG7Boj-3cTXc-qc4i12g0-7911uD

Targets

    • Target

      0RMQNB2.vmp.exe

    • Size

      12.6MB

    • MD5

      11acc6c6ae233255480dc44f28e907d3

    • SHA1

      58d7c0925ca9415b60ba0e2968720d1f9463d8b8

    • SHA256

      c4e7bcc051993b7478423dda0a744aa005eade7c740bf083f29f430427ee4d14

    • SHA512

      f32d9c674daf720f870fbb75909278fc3cf76c83f7c1ecf196c3cbb72dc43cd330159456a202b67cbf164a31f12737519c55068027be3eb024fe4141669a71cc

    • SSDEEP

      196608:M5y4n51bzDwrAYIqtmDQy/GpoXzT100wK6KXvU11XaAo:MP5hPaAYI8gQy/GpoXz7/Ujno

    Score
    10/10
    • Skuld stealer

      An info stealer written in Go lang.

MITRE ATT&CK Matrix

Tasks