General

  • Target

    skuld.exe

  • Size

    9.8MB

  • Sample

    241017-c63yksycjd

  • MD5

    ba8904102182cfee01183be323df0206

  • SHA1

    180f7131b08a336643e36eebb02bec7818e636a8

  • SHA256

    6e311aab3aa0107a6740047bb39ff4d0681e031d2a9be5b41a2fd43f99001c6b

  • SHA512

    30bb5af08e87b0056e44b15dde6bd3dca21d4d01ec3019cd69e0ccb169f31a1475a2d7092724bb3d5e0453eb7737383cec3748444aa52aba346e6f75dc58e74b

  • SSDEEP

    98304:BjoGgersz5XxkXX9jKNkeEkRJwEWpJBJZrZ6QmEHr:Bjzrszc4NkeE+JJ85mEHr

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1296301282251903037/WshT7A7pEu0AhyXLLTc0qGgKZbqZAIGAaYjzCFnVn9Q2bLinclJ4010EZGBBtfZKzDlG

Targets

    • Target

      skuld.exe

    • Size

      9.8MB

    • MD5

      ba8904102182cfee01183be323df0206

    • SHA1

      180f7131b08a336643e36eebb02bec7818e636a8

    • SHA256

      6e311aab3aa0107a6740047bb39ff4d0681e031d2a9be5b41a2fd43f99001c6b

    • SHA512

      30bb5af08e87b0056e44b15dde6bd3dca21d4d01ec3019cd69e0ccb169f31a1475a2d7092724bb3d5e0453eb7737383cec3748444aa52aba346e6f75dc58e74b

    • SSDEEP

      98304:BjoGgersz5XxkXX9jKNkeEkRJwEWpJBJZrZ6QmEHr:Bjzrszc4NkeE+JJ85mEHr

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks