General
-
Target
https://gofile.io/d/RgE9FK
-
Sample
250223-qh4rvsznw8
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/RgE9FK
Resource
win10v2004-20250217-en
16 signatures
150 seconds
Malware Config
Extracted
Family
skuld
C2
https://discordapp.com/api/webhooks/1342136216686039140/rIlidp79JXOwMsOPFGTR4P0LuqjLBq1TfI9OHpMrSNxdLTadTsj-JjjFKrf5t-Ko3AcH
Targets
-
-
Target
https://gofile.io/d/RgE9FK
Score10/10-
Skuld family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1