General

  • Target

    https://cdn.discordapp.com/attachments/1295127442817683547/1295127519028183191/test.exe?ex=670d84fe&is=670c337e&hm=0d595559eb02957c997413fdc1a25ae6c5f17c105473114dae648534ffbe7610&

  • Sample

    241013-zsbnhasell

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1284545435142459497/sZJdu71WF2vnQDFx5DbTlbAwGrlYn3vAhSJnEzrtKI0BnkbaxRVHjY9XeJFuMGr-racb

Targets

    • Target

      https://cdn.discordapp.com/attachments/1295127442817683547/1295127519028183191/test.exe?ex=670d84fe&is=670c337e&hm=0d595559eb02957c997413fdc1a25ae6c5f17c105473114dae648534ffbe7610&

    • Skuld stealer

      An info stealer written in Go lang.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks