General

  • Target

    skuld.exe

  • Size

    9.8MB

  • Sample

    241017-c7lexsyclc

  • MD5

    6cbfaf66c25b2255b6f28e12915c774d

  • SHA1

    11caa7a9f6bbfa96fba46aec5161db44b9e18961

  • SHA256

    9a567e4744768e1e1acfd90020843a40d22ed677187459f34c7c77b0db5db508

  • SHA512

    7ce5c70e5c9344da2b788a7d1a410883afdbe28b3ef17c4dd509baf0071ccc72e27407bce88ae91fe40316097e9a70e08c1a24e132d237dea2f5d5716ada7c36

  • SSDEEP

    98304:xdQrygchMRKooE0qqWdS5ELg3ZKEGTiBJZrZ6f/fLhQcR:xKMhMR4Nb5ELgJXPO/fLT

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1296301282251903037/WshT7A7pEu0AhyXLLTc0qGgKZbqZAIGAaYjzCFnVn9Q2bLinclJ4010EZGBBtfZKzDlG

Targets

    • Target

      skuld.exe

    • Size

      9.8MB

    • MD5

      6cbfaf66c25b2255b6f28e12915c774d

    • SHA1

      11caa7a9f6bbfa96fba46aec5161db44b9e18961

    • SHA256

      9a567e4744768e1e1acfd90020843a40d22ed677187459f34c7c77b0db5db508

    • SHA512

      7ce5c70e5c9344da2b788a7d1a410883afdbe28b3ef17c4dd509baf0071ccc72e27407bce88ae91fe40316097e9a70e08c1a24e132d237dea2f5d5716ada7c36

    • SSDEEP

      98304:xdQrygchMRKooE0qqWdS5ELg3ZKEGTiBJZrZ6f/fLhQcR:xKMhMR4Nb5ELgJXPO/fLT

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks