General

  • Target

    2024-11-15_689ba7283666394a62bd10ea110d47a8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    14.2MB

  • Sample

    241115-apzhqawbmq

  • MD5

    689ba7283666394a62bd10ea110d47a8

  • SHA1

    cbc8f332b250309ca7ea2a905d29694af000aba4

  • SHA256

    e9e501a993c0d1aa3b3524aebe82432b64a7b1c564a7e818ef11e272a2cfb934

  • SHA512

    7b60a673adb062023356b61e85d9afd4d1b4e05ab3c87592ce972a85ad8dce79096a84f67af0df39a23673538c8e729b4a2c4716f0001e6a7a0db74473808b03

  • SSDEEP

    196608:qWJafoL/tUoTX4Z9bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:qWsfm/gbh1lkSFCdTauZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1305387629273153566/qDXv1WahHo2Y9hB6XiKpTl2x7eseU9uPNDnOuQyzFRdI6BhMUiDQ4Hz-FWyjuDcAEJio

Targets

    • Target

      2024-11-15_689ba7283666394a62bd10ea110d47a8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      14.2MB

    • MD5

      689ba7283666394a62bd10ea110d47a8

    • SHA1

      cbc8f332b250309ca7ea2a905d29694af000aba4

    • SHA256

      e9e501a993c0d1aa3b3524aebe82432b64a7b1c564a7e818ef11e272a2cfb934

    • SHA512

      7b60a673adb062023356b61e85d9afd4d1b4e05ab3c87592ce972a85ad8dce79096a84f67af0df39a23673538c8e729b4a2c4716f0001e6a7a0db74473808b03

    • SSDEEP

      196608:qWJafoL/tUoTX4Z9bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:qWsfm/gbh1lkSFCdTauZo

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks