General

  • Target

    skuld.exe

  • Size

    3.2MB

  • Sample

    241015-3pesjaxclm

  • MD5

    0cbffd5f564734039d04c70ebcb02c08

  • SHA1

    157116051b4abf55ac37df3a16f9e6def53115e2

  • SHA256

    462f543db0c0da74966f556230b1cd1e69109a62288ae369ff5eb7a3652c7bad

  • SHA512

    04b98288b21cd690d1f195c3169b34086d26b44d51c1d989a76e3dfbe1e6cd6d4537592ad74b94cb7fdbde8a88622e20dec9e90d87af7ab64aa41d37bc7650f4

  • SSDEEP

    49152:zejRTaN19D1wntFKsse6lXMlocHWelbNvpGrpkOdkv8FYHVlRXnTa:kRTORyF6mlocHfPvpMkOSUFyXRXT

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1295890787866906655/mfDRgfo1fgUHsaqi_gku2qpFO0-SqKkZjtJEoyALzyVvp2lZDmZFuObthvEby8A5Heii

Targets

    • Target

      skuld.exe

    • Size

      3.2MB

    • MD5

      0cbffd5f564734039d04c70ebcb02c08

    • SHA1

      157116051b4abf55ac37df3a16f9e6def53115e2

    • SHA256

      462f543db0c0da74966f556230b1cd1e69109a62288ae369ff5eb7a3652c7bad

    • SHA512

      04b98288b21cd690d1f195c3169b34086d26b44d51c1d989a76e3dfbe1e6cd6d4537592ad74b94cb7fdbde8a88622e20dec9e90d87af7ab64aa41d37bc7650f4

    • SSDEEP

      49152:zejRTaN19D1wntFKsse6lXMlocHWelbNvpGrpkOdkv8FYHVlRXnTa:kRTORyF6mlocHfPvpMkOSUFyXRXT

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks