General

  • Target

    skuld.exe

  • Size

    9.8MB

  • Sample

    241017-cs5j9axdpd

  • MD5

    6bcff50ee935d50c86234e4ead479e55

  • SHA1

    e777528a010585c232bb46f16c88cc9acae9220e

  • SHA256

    730ba784ff107f62110aaf728394377bf0ff607ac362ff1a32a3365b943a9ce6

  • SHA512

    654b0be7a93d0517351782f225d3c83664672a33851960907ecc84b89b095bc8b7e2d44e4732c09a77ce6281275dde5723fa43e641909a418706f0d5c870af5c

  • SSDEEP

    98304:G4bwKrv8PbnZEFUSpARbdUyl9nFwCg8O8rEqG5BJZrZ6Tc0xHaA:G4bv8PdfssdUylxFwCg8O84fAc0xHf

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1296277918661738547/GvUWEusnErfhpdvz7DEgE8VzXSZ8oWS_ujEIVSB0XhETe5iWx3tB8zm_wjAS1bJTlXLF

Targets

    • Target

      skuld.exe

    • Size

      9.8MB

    • MD5

      6bcff50ee935d50c86234e4ead479e55

    • SHA1

      e777528a010585c232bb46f16c88cc9acae9220e

    • SHA256

      730ba784ff107f62110aaf728394377bf0ff607ac362ff1a32a3365b943a9ce6

    • SHA512

      654b0be7a93d0517351782f225d3c83664672a33851960907ecc84b89b095bc8b7e2d44e4732c09a77ce6281275dde5723fa43e641909a418706f0d5c870af5c

    • SSDEEP

      98304:G4bwKrv8PbnZEFUSpARbdUyl9nFwCg8O8rEqG5BJZrZ6Tc0xHaA:G4bv8PdfssdUylxFwCg8O84fAc0xHf

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks