General

  • Target

    2025-02-25_3607ba045853985118b8d54b91122154_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    14.8MB

  • Sample

    250225-rleskszjs3

  • MD5

    3607ba045853985118b8d54b91122154

  • SHA1

    d559b1e885f50924c7e0cd85d224411c9e1e6c1d

  • SHA256

    bfd7bc73191eab1c1c812a0a7a5aea593be09a8a0703bda1171879fc13a67bea

  • SHA512

    30267a06ecb383488ad30cf49c6a72dca71a9935cea610b12e2ae79e4abe02c6f0a0a3b40698919b65682f39be0213c607e384aa2c6b87bf9be067e8ea104607

  • SSDEEP

    196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWZ:xZ4XoBKHY9AuM73gQDvfUWZ

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1328831575789670452/xCCdIHtUlgPrQV3300CuNBr_DVbCb2fTTBtkXn4qDJnuJPpmJOp5dKrjZT4B0XHJ4OMa

Targets

    • Target

      2025-02-25_3607ba045853985118b8d54b91122154_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      14.8MB

    • MD5

      3607ba045853985118b8d54b91122154

    • SHA1

      d559b1e885f50924c7e0cd85d224411c9e1e6c1d

    • SHA256

      bfd7bc73191eab1c1c812a0a7a5aea593be09a8a0703bda1171879fc13a67bea

    • SHA512

      30267a06ecb383488ad30cf49c6a72dca71a9935cea610b12e2ae79e4abe02c6f0a0a3b40698919b65682f39be0213c607e384aa2c6b87bf9be067e8ea104607

    • SSDEEP

      196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWZ:xZ4XoBKHY9AuM73gQDvfUWZ

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks