General

  • Target

    massdm.exe

  • Size

    3.2MB

  • Sample

    250407-xlbc2s1n16

  • MD5

    25a24614a8b8470d6a08d34c3d112e70

  • SHA1

    fa8bab3543cc0b230b22e03476c66ed757745fe7

  • SHA256

    4b2fcf4c248449374081407da3c58aaa0ae64ef85fe3fea1c2a2d4af8b12d200

  • SHA512

    3162a70730d12d7825a3482203505942d89d34bfa757d6cc14a332edb8de8685373101897fe249f381c8362344877b039acb50a63b2aa4f3aab467f3ef950170

  • SSDEEP

    49152:1p+HMpTnRKy6F/G3g7LG+6PEQXgYv/bzmiTXLVXqnqmZ5qIe6aviJrOoa+/1yeXJ:b+Hg8t4QsM6gYv/j7Iqmbaia+/1yeX

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1357043739994099863/o63i2p8pjLj5CbxWN7dl1wegLzLXdC-yGgKJErxIHMKVPwRaq1e7GPr2dIUqpFgYV5Bi

Targets

    • Target

      massdm.exe

    • Size

      3.2MB

    • MD5

      25a24614a8b8470d6a08d34c3d112e70

    • SHA1

      fa8bab3543cc0b230b22e03476c66ed757745fe7

    • SHA256

      4b2fcf4c248449374081407da3c58aaa0ae64ef85fe3fea1c2a2d4af8b12d200

    • SHA512

      3162a70730d12d7825a3482203505942d89d34bfa757d6cc14a332edb8de8685373101897fe249f381c8362344877b039acb50a63b2aa4f3aab467f3ef950170

    • SSDEEP

      49152:1p+HMpTnRKy6F/G3g7LG+6PEQXgYv/bzmiTXLVXqnqmZ5qIe6aviJrOoa+/1yeXJ:b+Hg8t4QsM6gYv/j7Iqmbaia+/1yeX

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks