General

  • Target

    2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    14.2MB

  • Sample

    241118-w71z6axmfq

  • MD5

    b52f97f5927edde5ce2bcca43224e516

  • SHA1

    843fce85bcbf1b384e47cfb6a917dca3f9eca306

  • SHA256

    09cbf66e1c5aadf7441fb056a2c06b4e049e48285970d8462db2573721ca6dd7

  • SHA512

    e51f061da8d1cf3e47c9f1e0e25c44a284ab39c109d909ff5d288c28b412f1f130a8d8b03e3975096ab807fc637e1add769b299d23fb2ec9ccc3a885fa5fe6f9

  • SSDEEP

    196608:hWJafoL/tUoTX4Z3bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:hWsfm/Kbh1lkSFCdTauZo

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1305388883403472987/ZM8O2LPQSxTa4igY8m5aAhYHsO4eg1h9kOuq-8gIBF7em3NCqM_H_4VGDC2MFSLuaRMg

Targets

    • Target

      2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      14.2MB

    • MD5

      b52f97f5927edde5ce2bcca43224e516

    • SHA1

      843fce85bcbf1b384e47cfb6a917dca3f9eca306

    • SHA256

      09cbf66e1c5aadf7441fb056a2c06b4e049e48285970d8462db2573721ca6dd7

    • SHA512

      e51f061da8d1cf3e47c9f1e0e25c44a284ab39c109d909ff5d288c28b412f1f130a8d8b03e3975096ab807fc637e1add769b299d23fb2ec9ccc3a885fa5fe6f9

    • SSDEEP

      196608:hWJafoL/tUoTX4Z3bh1Yf0k7Ma/rkFlgdTaUrPPbdfw:hWsfm/Kbh1lkSFCdTauZo

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks