General

  • Target

    skuld.exe

  • Size

    10.3MB

  • Sample

    250414-3xxy3stqt3

  • MD5

    d80dc6ed2832129a02a1916ae22be26a

  • SHA1

    06f44d821ad943766b05ade8fa56e8e8f7b7f7eb

  • SHA256

    0caa2754c52580bb8efaa1d798f87389982902f71c7b36549759ff9e33e0036f

  • SHA512

    b251f80b16329109f8e8d1c03e7dd6c68245163858539bf22480485f0708e6dee3fedbbf95649b1ce0f2c5a3ed19bc8ead3b3f4c73b081119f14ad425e267f4c

  • SSDEEP

    98304:aZ/a5vGoCinKm2N2VS+Cs8aaItAOrFqaxFgEpgT5:aw5vGOnK6S+CsdaI2YlpgT

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1361486763046207628/P7oM_MuJjYmAA5l0jD5BmbQ25jlSYijtIXyk_kmz1kbI2lvdPbYuZuUgwUeWg-P7VWSY

Targets

    • Target

      skuld.exe

    • Size

      10.3MB

    • MD5

      d80dc6ed2832129a02a1916ae22be26a

    • SHA1

      06f44d821ad943766b05ade8fa56e8e8f7b7f7eb

    • SHA256

      0caa2754c52580bb8efaa1d798f87389982902f71c7b36549759ff9e33e0036f

    • SHA512

      b251f80b16329109f8e8d1c03e7dd6c68245163858539bf22480485f0708e6dee3fedbbf95649b1ce0f2c5a3ed19bc8ead3b3f4c73b081119f14ad425e267f4c

    • SSDEEP

      98304:aZ/a5vGoCinKm2N2VS+Cs8aaItAOrFqaxFgEpgT5:aw5vGOnK6S+CsdaI2YlpgT

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks