General

  • Target

    skuld.exe

  • Size

    9.8MB

  • Sample

    241017-clbctszgjn

  • MD5

    fe618ff70287d490bbc3907c6b96cfb5

  • SHA1

    66fcb9fe0fde6225a6176a7e6a548c244f2b369a

  • SHA256

    9cfedfaf229c04616557ceb03ba62a35f8f85d357f4899a52450fe5830e76880

  • SHA512

    d9f6685ea7c8cf75a73896f90a4e0577a9829565a289e7b09c671708bb694cbb13296f0786315ba710175be5b9d19c3454b4a434f8a590819f8408f4983168f8

  • SSDEEP

    98304:/dQrygchMRKooE0qqWdS5ELg3ZuEGTiBJZrZ6f/fLhQcR:/KMhMR4Nb5ELgJLPO/fLT

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1296277918661738547/GvUWEusnErfhpdvz7DEgE8VzXSZ8oWS_ujEIVSB0XhETe5iWx3tB8zm_wjAS1bJTlXLF

Targets

    • Target

      skuld.exe

    • Size

      9.8MB

    • MD5

      fe618ff70287d490bbc3907c6b96cfb5

    • SHA1

      66fcb9fe0fde6225a6176a7e6a548c244f2b369a

    • SHA256

      9cfedfaf229c04616557ceb03ba62a35f8f85d357f4899a52450fe5830e76880

    • SHA512

      d9f6685ea7c8cf75a73896f90a4e0577a9829565a289e7b09c671708bb694cbb13296f0786315ba710175be5b9d19c3454b4a434f8a590819f8408f4983168f8

    • SSDEEP

      98304:/dQrygchMRKooE0qqWdS5ELg3ZuEGTiBJZrZ6f/fLhQcR:/KMhMR4Nb5ELgJLPO/fLT

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks