General

  • Target

    2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

  • Size

    10.3MB

  • Sample

    250413-n5ep5sv1a1

  • MD5

    e80a935708de68867ead4bb0970a1cb6

  • SHA1

    caa4a3e54c849a1c8cb8e095e2f022942a9d5410

  • SHA256

    4c62630d86e3a8989ab9167a21822e686b9559e55421a1c779ad05eccfc6c908

  • SHA512

    d56f447971d9605491366d3e15fb264ff5a8b722a9fbc3d0e172ce7386b263b6f3a4a654f59e26bcccf0fbdc70a499500cc5e5363218d16e08deb3b7e3a7914b

  • SSDEEP

    98304:AkbS4GeZk9WMOfpgu+NsFUqNEXzR/wLA0rn7QEMb:Ad4dZkFu+NsyCEXzR/wcypMb

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1359962319148552262/rZhAvPTXLzaOSKyR1uwxW6MD_NJEUB5gXuznUEFFSSsBRLToarEs-ALUaMaDYY8Kazj0

Targets

    • Target

      2025-04-13_e80a935708de68867ead4bb0970a1cb6_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

    • Size

      10.3MB

    • MD5

      e80a935708de68867ead4bb0970a1cb6

    • SHA1

      caa4a3e54c849a1c8cb8e095e2f022942a9d5410

    • SHA256

      4c62630d86e3a8989ab9167a21822e686b9559e55421a1c779ad05eccfc6c908

    • SHA512

      d56f447971d9605491366d3e15fb264ff5a8b722a9fbc3d0e172ce7386b263b6f3a4a654f59e26bcccf0fbdc70a499500cc5e5363218d16e08deb3b7e3a7914b

    • SSDEEP

      98304:AkbS4GeZk9WMOfpgu+NsFUqNEXzR/wLA0rn7QEMb:Ad4dZkFu+NsyCEXzR/wcypMb

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks