General
-
Target
skuld.exe
-
Size
3.3MB
-
Sample
241017-bkpndstflb
-
MD5
b5e648164187948c217eea6ccc050309
-
SHA1
477da0d8ecbd5a701e194a3428d903339688a303
-
SHA256
1bfddb30d8d99718799ec533d513c7eb8e0ca3fd2aff87bb19c3ad0d09b73c13
-
SHA512
538c8ccc62ffd4cd4d204df6eb168312b00901b24eb07c92e272555def8420e37dcd9c7fcb4cec84ea9e340563b5c1a6664ab66cdcc5540bf86f09b557141678
-
SSDEEP
98304:F8egTVW/+U6PyIMEufQgvbK5nW4rC/RV1alA0V5+edf:SF+WWP/R0A0V5+of
Behavioral task
behavioral1
Sample
skuld.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
skuld.exe
Resource
macos-20240711.1-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1296277918661738547/GvUWEusnErfhpdvz7DEgE8VzXSZ8oWS_ujEIVSB0XhETe5iWx3tB8zm_wjAS1bJTlXLF
Targets
-
-
Target
skuld.exe
-
Size
3.3MB
-
MD5
b5e648164187948c217eea6ccc050309
-
SHA1
477da0d8ecbd5a701e194a3428d903339688a303
-
SHA256
1bfddb30d8d99718799ec533d513c7eb8e0ca3fd2aff87bb19c3ad0d09b73c13
-
SHA512
538c8ccc62ffd4cd4d204df6eb168312b00901b24eb07c92e272555def8420e37dcd9c7fcb4cec84ea9e340563b5c1a6664ab66cdcc5540bf86f09b557141678
-
SSDEEP
98304:F8egTVW/+U6PyIMEufQgvbK5nW4rC/RV1alA0V5+edf:SF+WWP/R0A0V5+of
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4