General

  • Target

    eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c

  • Size

    9.9MB

  • Sample

    241110-elc8jaymgy

  • MD5

    b9e0806263b66ad2c40a42ba4b0e1afa

  • SHA1

    e797f845e0326d085ea59ab07f1bfe5c97366972

  • SHA256

    eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c

  • SHA512

    5078cc2d5f39edcc33b6dc75a1d472be072ae7ab04867233dc6ebc2c527b6eb403bd8171872819476d442219d8f67484e38da29790f9b99f5cf3709e430d5692

  • SSDEEP

    98304:OzU4brhxBASgf/gEpiji6Ig8TWA6EIICafZm/mbnXg:OxrhxBAGZji6IdThnRTXg

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1303511495669452840/YMUYaitq1zYOnhWAEVTNaVIdpFxeL0NRpgtnapspyivC9Zkqm099aqfP1_BHdvn5J08S

Targets

    • Target

      eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c

    • Size

      9.9MB

    • MD5

      b9e0806263b66ad2c40a42ba4b0e1afa

    • SHA1

      e797f845e0326d085ea59ab07f1bfe5c97366972

    • SHA256

      eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c

    • SHA512

      5078cc2d5f39edcc33b6dc75a1d472be072ae7ab04867233dc6ebc2c527b6eb403bd8171872819476d442219d8f67484e38da29790f9b99f5cf3709e430d5692

    • SSDEEP

      98304:OzU4brhxBASgf/gEpiji6Ig8TWA6EIICafZm/mbnXg:OxrhxBAGZji6IdThnRTXg

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks