General
-
Target
cmd.exe
-
Size
9.9MB
-
Sample
241105-2mbsessqaq
-
MD5
9478056827dc985dba17b6c55e3cb928
-
SHA1
3cf6e9b6f1e3f3bf81ea6bcf5d18daa834d953ff
-
SHA256
063e987f285254ba377777908c86776620eb52bd075e3bc9c7c35afb483eadef
-
SHA512
d4f78e67f43533152c9cfb0abb3044a0bd17054a845b8ae5033f0f46c43b4772cc3691373cfd3c346f9fe9169dbb280fd158d6e8b90c176cbe19954c33690754
-
SSDEEP
98304:OzU4brhxBASgf/gEpiji6Ig8TWAiEIICafZm/mbnXg:OxrhxBAGZji6IdThvRTXg
Behavioral task
behavioral1
Sample
cmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cmd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1302814463975755826/SP0RWz-_aK--OyBDoh10bzitmgFKpMrGQ1jgC-LE5pmYIoTJz0KD2dpOlGc9R_RaAsf2
Targets
-
-
Target
cmd.exe
-
Size
9.9MB
-
MD5
9478056827dc985dba17b6c55e3cb928
-
SHA1
3cf6e9b6f1e3f3bf81ea6bcf5d18daa834d953ff
-
SHA256
063e987f285254ba377777908c86776620eb52bd075e3bc9c7c35afb483eadef
-
SHA512
d4f78e67f43533152c9cfb0abb3044a0bd17054a845b8ae5033f0f46c43b4772cc3691373cfd3c346f9fe9169dbb280fd158d6e8b90c176cbe19954c33690754
-
SSDEEP
98304:OzU4brhxBASgf/gEpiji6Ig8TWAiEIICafZm/mbnXg:OxrhxBAGZji6IdThvRTXg
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-