Resubmissions

26-12-2024 10:52

241226-myqcmatlhx 10

26-12-2024 10:39

241226-mp9pxatjfz 10

General

  • Target

    Comet.exe.zip

  • Size

    8.6MB

  • Sample

    241226-mp9pxatjfz

  • MD5

    f1bf2341c47307dd74e84f352ac1d514

  • SHA1

    84b1f90ec0f8714e38d2fa39c3f9a21732aed85b

  • SHA256

    414180a9f9707cb3501546487051badead26b0d08d0143302c62f84b81a565f5

  • SHA512

    a825620164ead5d841865833ba912b39459caf25976bb772093ed4e9430b8fe9493771ed3e60c7e75ebefb04f22e693fb815fec266426ab751698cf06d10b182

  • SSDEEP

    196608:kyf7WXRRqIUXkiLamrFcDAMVd+elWPddJn42KHwcGFGA0Pv6D9ml:hSXLqJZ12D1jnlgdCvQcRAIck

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1320235014511792160/59qb1BvUIDJlYJZoQnnxe4CNf8Swi8--Nwm7q4BECFectFCCJWiM-H8Ng2tA4-dl6Vyb

Targets

    • Target

      Comet.exe.bin

    • Size

      8.6MB

    • MD5

      1f5d19397b48172aba35885f39e318fa

    • SHA1

      df77020bffc62f386b5ce0ad0cde3d8f8b704b93

    • SHA256

      dd780875686be33910002f91aaeb8f8ec70a2f3972c41c707a59ef18cd900e74

    • SHA512

      4ccec7c602582d467a63e8f6e8fc222e73bb88a589256fac0577452b6ffaaec58adf2b5e216f8a27404c4717a74f239ce73226385133764b75baa775b25de4a0

    • SSDEEP

      196608:u9+8ZspGS5puzUZqVBU6NABaScfR3xeUDyzfS/FNgeLCtNP:u9+EEp5ZqPBOhcftAUDyzqNutNP

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks