General

  • Target

    2025-03-28_3e58b3488744628bca8063ec01a6b361_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

  • Size

    10.3MB

  • Sample

    250328-271bhsvpz9

  • MD5

    3e58b3488744628bca8063ec01a6b361

  • SHA1

    b9cdef6699826f272bc104f0b8d4acb782f7a71d

  • SHA256

    b3be9f3bfcfa597bd30f7f9e52ef5b901491e84ae8bb2739006ef658be617891

  • SHA512

    a12130cde4a4e6515981c1d5cb59e5f5be71c0023d2b8cf739d8ce170bf2b3fe2f3c945d7d22970ff9b7939ef67855f36c28bb00ca7080afce7a1ee808283992

  • SSDEEP

    98304:i1lqRd4iyit8Rz+qTrHrYW9iEVrR1akuAx3hzEqP:iGRdQitkTrHrYW9jeqP

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1355177321123807363/7A57OHY5T3CCMXUv3pJRb3j0EYbnJUEHEbtc5HMHQiLivb6JWAx4aZorjkNYhmOakHAS

Targets

    • Target

      2025-03-28_3e58b3488744628bca8063ec01a6b361_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

    • Size

      10.3MB

    • MD5

      3e58b3488744628bca8063ec01a6b361

    • SHA1

      b9cdef6699826f272bc104f0b8d4acb782f7a71d

    • SHA256

      b3be9f3bfcfa597bd30f7f9e52ef5b901491e84ae8bb2739006ef658be617891

    • SHA512

      a12130cde4a4e6515981c1d5cb59e5f5be71c0023d2b8cf739d8ce170bf2b3fe2f3c945d7d22970ff9b7939ef67855f36c28bb00ca7080afce7a1ee808283992

    • SSDEEP

      98304:i1lqRd4iyit8Rz+qTrHrYW9iEVrR1akuAx3hzEqP:iGRdQitkTrHrYW9jeqP

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks