General

  • Target

    skuld.exe

  • Size

    7.5MB

  • Sample

    241206-cgs23svjbs

  • MD5

    123ed4573b0c7b489f0e25777ccd39e1

  • SHA1

    14c644a91b6ca0f6bcc731e40617cb012a8b6553

  • SHA256

    475779eca55ad58973f1da315fc8be958315d6e34751ba6da4be2b1a6736b201

  • SHA512

    6acf6ca3ae4af3b2a679139ecf93bf506862a5fc47229f0b86ebb37147b8df3a19a9ffc60fe41906c54bd5d1968814336ee149a68e9671f4dc4535afefb06af4

  • SSDEEP

    196608:6+59cxLEdZwmNV8quEu/0crKmAP1nnv7jiUm9+sFkluKq+L9zc:6+5qLEMc8qXu4NqUm0Hl8+R

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1311740711502352385/Mus14eFpavE24yqmLhHa3WmeZHFCuUvqv8Fe6usJGPf13nz4IDP3bH6YwTfpBBPuEU2R

Targets

    • Target

      skuld.exe

    • Size

      7.5MB

    • MD5

      123ed4573b0c7b489f0e25777ccd39e1

    • SHA1

      14c644a91b6ca0f6bcc731e40617cb012a8b6553

    • SHA256

      475779eca55ad58973f1da315fc8be958315d6e34751ba6da4be2b1a6736b201

    • SHA512

      6acf6ca3ae4af3b2a679139ecf93bf506862a5fc47229f0b86ebb37147b8df3a19a9ffc60fe41906c54bd5d1968814336ee149a68e9671f4dc4535afefb06af4

    • SSDEEP

      196608:6+59cxLEdZwmNV8quEu/0crKmAP1nnv7jiUm9+sFkluKq+L9zc:6+5qLEMc8qXu4NqUm0Hl8+R

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks