General

  • Target

    57d433e8ead48fc3b16835bbf655abd3f64104d8eced2e6db84d7251dabb67af.exe

  • Size

    9.8MB

  • Sample

    241210-wm3cgsxlbn

  • MD5

    d30d45113ba62d17e6bec2b04442daec

  • SHA1

    83f186d76f16c7669d476542a049cfdd1163bbe0

  • SHA256

    57d433e8ead48fc3b16835bbf655abd3f64104d8eced2e6db84d7251dabb67af

  • SHA512

    66cbbf56bd3991f1c7ec993735ddf9eda19a693c0dc859ceb6dce5ed626dd668ed61240457ecdf0c200cdfa595a29a3329aa183f717b31afe226cab422ab67f5

  • SSDEEP

    98304:hH6fVmD1C2gnoWoS7Kr7Eg7ru9MvE9pRD4Z4S5bovrN:hH31C2bSI7Eg7ySsqBRovrN

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1313142704439427092/YKwWrnk0E-QciBzXVfcEmZg-CAYCUchZuAphpzY_DvCmjRKFsYGLIEowP8dExV6arEe2

Targets

    • Target

      57d433e8ead48fc3b16835bbf655abd3f64104d8eced2e6db84d7251dabb67af.exe

    • Size

      9.8MB

    • MD5

      d30d45113ba62d17e6bec2b04442daec

    • SHA1

      83f186d76f16c7669d476542a049cfdd1163bbe0

    • SHA256

      57d433e8ead48fc3b16835bbf655abd3f64104d8eced2e6db84d7251dabb67af

    • SHA512

      66cbbf56bd3991f1c7ec993735ddf9eda19a693c0dc859ceb6dce5ed626dd668ed61240457ecdf0c200cdfa595a29a3329aa183f717b31afe226cab422ab67f5

    • SSDEEP

      98304:hH6fVmD1C2gnoWoS7Kr7Eg7ru9MvE9pRD4Z4S5bovrN:hH31C2bSI7Eg7ySsqBRovrN

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks