General

  • Target

    2025-04-19_389a06b07cba83dbb84fa1b1abb68de2_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

  • Size

    10.2MB

  • Sample

    250419-1tg3caxqz7

  • MD5

    389a06b07cba83dbb84fa1b1abb68de2

  • SHA1

    fae30c76998aa8b9d8e5ac3dd40f5f07c89639d2

  • SHA256

    b5b2c083eb9c1286c263bebc4280d1ae3fa0fd96ab1afd8ab6240e87cd9d660a

  • SHA512

    7d359c0837123899818f6dc08ff48ba75897a707294990d70e7ffdb60d340d46c70b8220a0058225c4d21991f8282b9efa403f8e5747a3300cf9ff5a12bcce5f

  • SSDEEP

    98304:nvU6XUJNe9vI/XtozXTTs4E5UwqR+jAqrRL/HEqUYew5:n87NeK/XKri5UwqR+Eksq

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1347918418443112581/GkDwq8MHjdCAhyHtTdvrRd6q8Bx-z0ijbWTpNUbq0uK2sxpU3rbS1VmRdlbJmS43hP3U

Targets

    • Target

      2025-04-19_389a06b07cba83dbb84fa1b1abb68de2_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

    • Size

      10.2MB

    • MD5

      389a06b07cba83dbb84fa1b1abb68de2

    • SHA1

      fae30c76998aa8b9d8e5ac3dd40f5f07c89639d2

    • SHA256

      b5b2c083eb9c1286c263bebc4280d1ae3fa0fd96ab1afd8ab6240e87cd9d660a

    • SHA512

      7d359c0837123899818f6dc08ff48ba75897a707294990d70e7ffdb60d340d46c70b8220a0058225c4d21991f8282b9efa403f8e5747a3300cf9ff5a12bcce5f

    • SSDEEP

      98304:nvU6XUJNe9vI/XtozXTTs4E5UwqR+jAqrRL/HEqUYew5:n87NeK/XKri5UwqR+Eksq

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks