General

  • Target

    2025-04-05_12619233cdb0693aebcac0052a37c3f0_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

  • Size

    10.3MB

  • Sample

    250405-ltppvstyhv

  • MD5

    12619233cdb0693aebcac0052a37c3f0

  • SHA1

    d6efcb17566c67341f3e7fdb44a5979722c6f84b

  • SHA256

    50b045b023fe26165e3bbc4e42c3da2697e4450008c0e954390c5fa36b0ffce2

  • SHA512

    c5f3eb80e96d775a39243c049b1ad0166f956808125a3addc160fd65639643fccea4019cf4aba81c4885beb8809108e887c6595ba83c14094b50e98c92483d57

  • SSDEEP

    98304:/Mt1qcH0HZznW6/tfpXKK2tA0rUzr9/LEFbb:/A1q+0H1tfpXKK22xYFbb

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1357082631573078157/DibNl1Wwh9g5xRfj4_imdnlncz6vV0eYUzLBzWZa6D1S0XAEPgI4MD4icqfeV2vZDlty

Targets

    • Target

      2025-04-05_12619233cdb0693aebcac0052a37c3f0_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

    • Size

      10.3MB

    • MD5

      12619233cdb0693aebcac0052a37c3f0

    • SHA1

      d6efcb17566c67341f3e7fdb44a5979722c6f84b

    • SHA256

      50b045b023fe26165e3bbc4e42c3da2697e4450008c0e954390c5fa36b0ffce2

    • SHA512

      c5f3eb80e96d775a39243c049b1ad0166f956808125a3addc160fd65639643fccea4019cf4aba81c4885beb8809108e887c6595ba83c14094b50e98c92483d57

    • SSDEEP

      98304:/Mt1qcH0HZznW6/tfpXKK2tA0rUzr9/LEFbb:/A1q+0H1tfpXKK22xYFbb

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks