General

  • Target

    2025-01-28_2ff000aee2af55428df59ad5277ada0f_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    14.8MB

  • Sample

    250128-w2qbgaxmbt

  • MD5

    2ff000aee2af55428df59ad5277ada0f

  • SHA1

    732629549d5df0974c07eb3d96ac30db447c7e68

  • SHA256

    efcda002e92d69623ab615306560cd848019882e2f0eb972efe7244c8c046714

  • SHA512

    f59ffefa014a1706f9a2ca8761bd19c96c050fcf8611ab527e147cc92c9415e1490b048aa104200fbd59240827efb79cefbb5f5b62fe8c4bab169117a94ca81c

  • SSDEEP

    196608:vqZ4f/oCqKqc/3h4Po9uXx+29GAB7ob73mrVGwYdNE2vfUW:SZ4XoBKHu9AuM73gQDvfUW

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1331761917727084646/El8Dv-uU9PSLWtG7icdCdqERvxIcsZOWfLR5mCjfoeCSe77ejA7RzzAIO1eEDYpDaLR2

Targets

    • Target

      2025-01-28_2ff000aee2af55428df59ad5277ada0f_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      14.8MB

    • MD5

      2ff000aee2af55428df59ad5277ada0f

    • SHA1

      732629549d5df0974c07eb3d96ac30db447c7e68

    • SHA256

      efcda002e92d69623ab615306560cd848019882e2f0eb972efe7244c8c046714

    • SHA512

      f59ffefa014a1706f9a2ca8761bd19c96c050fcf8611ab527e147cc92c9415e1490b048aa104200fbd59240827efb79cefbb5f5b62fe8c4bab169117a94ca81c

    • SSDEEP

      196608:vqZ4f/oCqKqc/3h4Po9uXx+29GAB7ob73mrVGwYdNE2vfUW:SZ4XoBKHu9AuM73gQDvfUW

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks