General

  • Target

    skuld-loader.exe

  • Size

    5.1MB

  • Sample

    241118-ewbsfstkam

  • MD5

    004241692178fcd05d3af3634924de1d

  • SHA1

    b95b4ec34b8810edc751cde052c848d77abd8d79

  • SHA256

    97fc89cc80cc312f1d56f93387b03244557a5127e33a02b754af3ff381b723f8

  • SHA512

    cad4a5c6a106bf185df14a434c899958e5c77df182d19d977c8c1ff1fb3f459d9cbeef8f2b8722200a14910e744a6c41c160b224ce92fae0c9261520532f6e1b

  • SSDEEP

    49152:8WH0mLAMdn4S6eo4ZTfSXRRSgcJ1l+Y6Z5EdCtqb8Bb76XMb:Jv7o41AcJ1EE7wBfF

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1307911451826192456/OlBlcktAz-WmiQjz9X7Kjk-297-zipSotjVWMkK52mcmGCBP9eC7G3Fqgu9ZnjAfTnzt

Targets

    • Target

      skuld-loader.exe

    • Size

      5.1MB

    • MD5

      004241692178fcd05d3af3634924de1d

    • SHA1

      b95b4ec34b8810edc751cde052c848d77abd8d79

    • SHA256

      97fc89cc80cc312f1d56f93387b03244557a5127e33a02b754af3ff381b723f8

    • SHA512

      cad4a5c6a106bf185df14a434c899958e5c77df182d19d977c8c1ff1fb3f459d9cbeef8f2b8722200a14910e744a6c41c160b224ce92fae0c9261520532f6e1b

    • SSDEEP

      49152:8WH0mLAMdn4S6eo4ZTfSXRRSgcJ1l+Y6Z5EdCtqb8Bb76XMb:Jv7o41AcJ1EE7wBfF

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks