General

  • Target

    2025-02-25_4d9462d9fbb8b233ca5120223d373e27_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

  • Size

    14.8MB

  • Sample

    250225-rtegsazmz6

  • MD5

    4d9462d9fbb8b233ca5120223d373e27

  • SHA1

    66cde09b46244f1883a93403d2c218688f05987a

  • SHA256

    f6888a1b623400e61788d15b9b8ccc496f39bcd8689ab726f12652047dcfbeb7

  • SHA512

    6df6ebd1cb58eac9c79b29420b31dbf829389b78d2aef17ca5306ed332c6dd1df4cd0d187632bfe6af73ca85736a55ff922491882b53b24178e0cf50eb499365

  • SSDEEP

    196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWm:xZ4XoBKHY9AuM73gQDvfUWm

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1328831575789670452/xCCdIHtUlgPrQV3300CuNBr_DVbCb2fTTBtkXn4qDJnuJPpmJOp5dKrjZT4B0XHJ4OMa

Targets

    • Target

      2025-02-25_4d9462d9fbb8b233ca5120223d373e27_frostygoop_luca-stealer_ngrbot_poet-rat_snatch

    • Size

      14.8MB

    • MD5

      4d9462d9fbb8b233ca5120223d373e27

    • SHA1

      66cde09b46244f1883a93403d2c218688f05987a

    • SHA256

      f6888a1b623400e61788d15b9b8ccc496f39bcd8689ab726f12652047dcfbeb7

    • SHA512

      6df6ebd1cb58eac9c79b29420b31dbf829389b78d2aef17ca5306ed332c6dd1df4cd0d187632bfe6af73ca85736a55ff922491882b53b24178e0cf50eb499365

    • SSDEEP

      196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWm:xZ4XoBKHY9AuM73gQDvfUWm

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks