General
-
Target
malw.zip
-
Size
4.0MB
-
Sample
250215-nh5m2szmcl
-
MD5
b5c4cab36c102992c9ccf6fd7bc6b670
-
SHA1
b08a841b4dc8b4ca32aa0d6341e64b376aa73898
-
SHA256
4e90ecd2cd56ee99511c63b870a8c9b613a63f87dbfb08bef90fd55cf3d81475
-
SHA512
127f4c6b68800fb0844581bb442e7cd606e8954253151922439eabd03973c33d943cf7fe7c5bc055d5b74ccf867eade313773a4f46fed6abcd39a16ba4459db5
-
SSDEEP
98304:cZVnmy9zGNaPnitRkQNO1+vZbtEQi4vz+ripvfmrOJYKgvh:2gmGNdRkQ0QvZb+kf+SJIh
Behavioral task
behavioral1
Sample
malw.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
malw.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1285808008127053927/bnNxBQO1Briav8yFpyPkDylQRl3agJyrCHMbWTiXHOKqC8ls42WjuC8zOyowOhBS19nF
Targets
-
-
Target
malw.exe
-
Size
9.1MB
-
MD5
3175713b9849fd658f591fcc05005c1c
-
SHA1
b005779ebdfa85dba12f7e0857904b24ef0f21a4
-
SHA256
92097313c2c5240fb78cc69f4be139ad9ee60284b57acccb58afae86b8b93226
-
SHA512
4426b081c883939125df3606d4fc1fb56aae11fa09b39660b19aa31d788c655c30aa88d52c1ae79495cfdc2bce88602ecf25880729f329ca2bbc53a57132ca36
-
SSDEEP
98304:YkHMD+5Ix59169zvQBf/8sH58OOuRhELuXjIhtoBW:DH5Ix591kE/8sH58tuRiCAoB
-
Skuld family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2