General
-
Target
eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c
-
Size
9.9MB
-
Sample
241110-elc8jaymgy
-
MD5
b9e0806263b66ad2c40a42ba4b0e1afa
-
SHA1
e797f845e0326d085ea59ab07f1bfe5c97366972
-
SHA256
eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c
-
SHA512
5078cc2d5f39edcc33b6dc75a1d472be072ae7ab04867233dc6ebc2c527b6eb403bd8171872819476d442219d8f67484e38da29790f9b99f5cf3709e430d5692
-
SSDEEP
98304:OzU4brhxBASgf/gEpiji6Ig8TWA6EIICafZm/mbnXg:OxrhxBAGZji6IdThnRTXg
Behavioral task
behavioral1
Sample
eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1303511495669452840/YMUYaitq1zYOnhWAEVTNaVIdpFxeL0NRpgtnapspyivC9Zkqm099aqfP1_BHdvn5J08S
Targets
-
-
Target
eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c
-
Size
9.9MB
-
MD5
b9e0806263b66ad2c40a42ba4b0e1afa
-
SHA1
e797f845e0326d085ea59ab07f1bfe5c97366972
-
SHA256
eb69219e7087d2cde2b4d5fc8f5916e6da4c8ded26d596225c9ffdb6432afe7c
-
SHA512
5078cc2d5f39edcc33b6dc75a1d472be072ae7ab04867233dc6ebc2c527b6eb403bd8171872819476d442219d8f67484e38da29790f9b99f5cf3709e430d5692
-
SSDEEP
98304:OzU4brhxBASgf/gEpiji6Ig8TWA6EIICafZm/mbnXg:OxrhxBAGZji6IdThnRTXg
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-