General

  • Target

    OnlineFix64.dll

  • Size

    9.8MB

  • Sample

    250111-w13keayjbp

  • MD5

    4e8de2b87675a0cbbf6786bcfafd74b1

  • SHA1

    72dc1e2b659d083fd6786bc16c7c40f2141ac3f9

  • SHA256

    c0186ec92c9484850928261079e1822c988194e712e368751a6ddbcddced1232

  • SHA512

    20f1889242f23749d907a934b8b3f5b38c7b9f6d1ba61a3d47313a912535d85428223e83c61755044ce9303b98fd4d89026d7a9067e71f5134668cac99c21fab

  • SSDEEP

    98304:wbLXMpZITlwICT6ZtTXwMI5j2Uhv/rEDxcZDVZ4R6Pr:wbkIZwIhTNI5j2uvgGamr

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1325153812511457281/SfiompCi9QEfMTUl7y9XuKGEoFi_Q0_rZgfEPMR4FO3uU2uFkexmnRS_cnTOsrLQ8DCQ

Targets

    • Target

      OnlineFix64.dll

    • Size

      9.8MB

    • MD5

      4e8de2b87675a0cbbf6786bcfafd74b1

    • SHA1

      72dc1e2b659d083fd6786bc16c7c40f2141ac3f9

    • SHA256

      c0186ec92c9484850928261079e1822c988194e712e368751a6ddbcddced1232

    • SHA512

      20f1889242f23749d907a934b8b3f5b38c7b9f6d1ba61a3d47313a912535d85428223e83c61755044ce9303b98fd4d89026d7a9067e71f5134668cac99c21fab

    • SSDEEP

      98304:wbLXMpZITlwICT6ZtTXwMI5j2Uhv/rEDxcZDVZ4R6Pr:wbkIZwIhTNI5j2uvgGamr

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks