General

  • Target

    2025-02-16_c96cdc7ea4d4d5a71be3d8a72c9c28dd_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    10.3MB

  • Sample

    250216-3eh27ssnfz

  • MD5

    c96cdc7ea4d4d5a71be3d8a72c9c28dd

  • SHA1

    9078982f23eb52ad82fba226c4cfedae1abdc88c

  • SHA256

    4cdb1819744e80f7be729819c1783e92806128991c233a9e73409d6d4ff66ba9

  • SHA512

    1b948c937674a40aac97c62b6192c5e5fec676374130306a14e39e0baf86760cc511407591b1ab941ab2776a15f99f9fa2eec1da58f640d9e3a8769a63def1c9

  • SSDEEP

    98304:AtJfCVLAQTyEAlZ8B6OjKXrj/mrfEbdWEq+2:AOL9TyaB6OjKX3h5Tq+2

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1340733868617105489/2JYqacUdqHRAnvOPJRIgyR-OX5_-RaVklX42aX9-IyYpChrntmy28iMZeeKML80hSc_W

Targets

    • Target

      2025-02-16_c96cdc7ea4d4d5a71be3d8a72c9c28dd_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      10.3MB

    • MD5

      c96cdc7ea4d4d5a71be3d8a72c9c28dd

    • SHA1

      9078982f23eb52ad82fba226c4cfedae1abdc88c

    • SHA256

      4cdb1819744e80f7be729819c1783e92806128991c233a9e73409d6d4ff66ba9

    • SHA512

      1b948c937674a40aac97c62b6192c5e5fec676374130306a14e39e0baf86760cc511407591b1ab941ab2776a15f99f9fa2eec1da58f640d9e3a8769a63def1c9

    • SSDEEP

      98304:AtJfCVLAQTyEAlZ8B6OjKXrj/mrfEbdWEq+2:AOL9TyaB6OjKX3h5Tq+2

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks