General

  • Target

    2025-01-03_9fd1dcc80b22c5f938195521e6f2f877_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    9.5MB

  • Sample

    250103-apcnys1qay

  • MD5

    9fd1dcc80b22c5f938195521e6f2f877

  • SHA1

    bc3890a1d4cab49a2a266d5d585b9c0d9c5e73f1

  • SHA256

    510f275dfa781cbab7a524777e791389d68307409587e4807b1b9ca74f4fb842

  • SHA512

    50621fc5dc02481508110bfa5aea2f7c976d0c5fdc116f46fa25eb1cd9db93d8d6795816828367bea4cb9559d337aad87d7b34ed725f28a1af9e8e115fb3c773

  • SSDEEP

    98304:bLNkPQbfzcsr+zUxkol+6VHMk8E/BO7F/Bz2wIb:1OSfzHkol+MHMk1/B+zIb

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1265325184819400795/r66VFyVKbOUUCTANmKSZcafexbRfFLK-RuIdl7fYiW-YSIdw7JWla91awXE9xTj79ExK

Targets

    • Target

      2025-01-03_9fd1dcc80b22c5f938195521e6f2f877_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      9.5MB

    • MD5

      9fd1dcc80b22c5f938195521e6f2f877

    • SHA1

      bc3890a1d4cab49a2a266d5d585b9c0d9c5e73f1

    • SHA256

      510f275dfa781cbab7a524777e791389d68307409587e4807b1b9ca74f4fb842

    • SHA512

      50621fc5dc02481508110bfa5aea2f7c976d0c5fdc116f46fa25eb1cd9db93d8d6795816828367bea4cb9559d337aad87d7b34ed725f28a1af9e8e115fb3c773

    • SSDEEP

      98304:bLNkPQbfzcsr+zUxkol+6VHMk8E/BO7F/Bz2wIb:1OSfzHkol+MHMk1/B+zIb

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks