General

  • Target

    2025-02-24_f82e86938d6e97fcb851e0f616c14f0a_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    14.8MB

  • Sample

    250224-bm5sdsxpay

  • MD5

    f82e86938d6e97fcb851e0f616c14f0a

  • SHA1

    85488addf46ce3d48a7e57dffce076ca5c3352a4

  • SHA256

    e12b792440ddb95d7c54a6414e63a977b60d70fed7d183d2e7d67128ce2ffeb9

  • SHA512

    ded4575aadedc1c743c6fc7ec960b7d9104288c333fa64c60a78a7c9d987a5d9dbade63fd857f424449750687f250af616a6a96ac869d13083554285d1d0b67c

  • SSDEEP

    196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUW:xZ4XoBKHY9AuM73gQDvfUW

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1328831575789670452/xCCdIHtUlgPrQV3300CuNBr_DVbCb2fTTBtkXn4qDJnuJPpmJOp5dKrjZT4B0XHJ4OMa

Targets

    • Target

      2025-02-24_f82e86938d6e97fcb851e0f616c14f0a_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      14.8MB

    • MD5

      f82e86938d6e97fcb851e0f616c14f0a

    • SHA1

      85488addf46ce3d48a7e57dffce076ca5c3352a4

    • SHA256

      e12b792440ddb95d7c54a6414e63a977b60d70fed7d183d2e7d67128ce2ffeb9

    • SHA512

      ded4575aadedc1c743c6fc7ec960b7d9104288c333fa64c60a78a7c9d987a5d9dbade63fd857f424449750687f250af616a6a96ac869d13083554285d1d0b67c

    • SSDEEP

      196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUW:xZ4XoBKHY9AuM73gQDvfUW

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks