General

  • Target

    2024-12-11_73d7775b66093680a4adc2c34e599f58_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    10.3MB

  • Sample

    241211-qz83xavlev

  • MD5

    73d7775b66093680a4adc2c34e599f58

  • SHA1

    a24825eb3073746543655c11c9606755e15a89dd

  • SHA256

    472fe58d47d38eeaaeaad3ba208878a598a61bb3e1297c4f372b57eed1290d12

  • SHA512

    0221095f86bfd800f3d94ce1e3a78883109ba825f47a3a904fe5c51fac2109f2b49d8266d66d7423ece487296ef384a1831f3916c7fdb987a18817b6cc166ad7

  • SSDEEP

    98304:68fDNaDkk5l75jAoqk6XseMpmC+/ErD2gCZm/z:xf+/5lFGpseMpX+cCaz

Malware Config

Extracted

Family

skuld

C2

https://discordapp.com/api/webhooks/1313250598488899745/WHo0SCjULcItD7-lMdxR2Qefs8SiHpsLvOVYqYrw3-N9t9S8lN5CfKJfeDlxJsZG2Pot

Targets

    • Target

      2024-12-11_73d7775b66093680a4adc2c34e599f58_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      10.3MB

    • MD5

      73d7775b66093680a4adc2c34e599f58

    • SHA1

      a24825eb3073746543655c11c9606755e15a89dd

    • SHA256

      472fe58d47d38eeaaeaad3ba208878a598a61bb3e1297c4f372b57eed1290d12

    • SHA512

      0221095f86bfd800f3d94ce1e3a78883109ba825f47a3a904fe5c51fac2109f2b49d8266d66d7423ece487296ef384a1831f3916c7fdb987a18817b6cc166ad7

    • SSDEEP

      98304:68fDNaDkk5l75jAoqk6XseMpmC+/ErD2gCZm/z:xf+/5lFGpseMpX+cCaz

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks