Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch

  • Size

    10.3MB

  • Sample

    250322-rw7aksvtav

  • MD5

    5a5f9a96c3c41e82d56a051edb36f82b

  • SHA1

    8d6f39f71037917fc7c15241f7131b9901fb7b54

  • SHA256

    ef629b3a44d02b2508b720cb5de2a2fbc54a59a63449e328dd403bfbed07b4ed

  • SHA512

    46fd1e91a6a06f34327720ef9e6a76ef2ee0e061ec204d5bac790594ff66987a4ec5e5f4b3d00da7159b2fb3f8cead858cc51debd706cbdcf21222d0b48fe596

  • SSDEEP

    98304:1yRLY7s83mbP5+zgpsA6d+XiT/CM/brSEZEGQT:1193IP5+oC+XiT/Ck8GQT

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1350543866280939550/SY52rRqXQT0N0wIPigi43bkoctLXTSNakcRfTDLaY88qjnjY4ZJaYUkqUKG9Y4zK8bET

Targets

    • Target

      2025-03-22_5a5f9a96c3c41e82d56a051edb36f82b_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch

    • Size

      10.3MB

    • MD5

      5a5f9a96c3c41e82d56a051edb36f82b

    • SHA1

      8d6f39f71037917fc7c15241f7131b9901fb7b54

    • SHA256

      ef629b3a44d02b2508b720cb5de2a2fbc54a59a63449e328dd403bfbed07b4ed

    • SHA512

      46fd1e91a6a06f34327720ef9e6a76ef2ee0e061ec204d5bac790594ff66987a4ec5e5f4b3d00da7159b2fb3f8cead858cc51debd706cbdcf21222d0b48fe596

    • SSDEEP

      98304:1yRLY7s83mbP5+zgpsA6d+XiT/CM/brSEZEGQT:1193IP5+oC+XiT/Ck8GQT

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks