General

  • Target

    2025-04-19_90259c6d35073efc4f433302566feff4_frostygoop_ghostlocker_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

  • Size

    14.8MB

  • Sample

    250419-kep7ea1sdt

  • MD5

    90259c6d35073efc4f433302566feff4

  • SHA1

    2ab675ad8ab831b1d475df0caca69d390c56261a

  • SHA256

    0d523bcb4d03ec93e0f83f241f70407d5c4b74378fac75168da10384c7f051aa

  • SHA512

    8e1206116dd4f884d3d464eb24bef7344c97086eb1071032ad1b74a8d98075481bf635f6032407025a2448c034203929e5679a1c06729b2792504d265516667d

  • SSDEEP

    196608:BqZ4f/oCqKqc/3h4Po9cXx+29GAB7ob73mrVGwYdNE2vfUW4:YZ4XoBKHc9AuM73gQDvfUW4

Malware Config

Extracted

Family

skuld

C2

https://ptb.discord.com/api/webhooks/1348131200857931882/1hWtQKLnqZymVPHuN_FEwWXgUpXkRZt4_i-XjTYOgWhMR0uQZpenwavljuW_bDkv1dvX

Targets

    • Target

      2025-04-19_90259c6d35073efc4f433302566feff4_frostygoop_ghostlocker_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch

    • Size

      14.8MB

    • MD5

      90259c6d35073efc4f433302566feff4

    • SHA1

      2ab675ad8ab831b1d475df0caca69d390c56261a

    • SHA256

      0d523bcb4d03ec93e0f83f241f70407d5c4b74378fac75168da10384c7f051aa

    • SHA512

      8e1206116dd4f884d3d464eb24bef7344c97086eb1071032ad1b74a8d98075481bf635f6032407025a2448c034203929e5679a1c06729b2792504d265516667d

    • SSDEEP

      196608:BqZ4f/oCqKqc/3h4Po9cXx+29GAB7ob73mrVGwYdNE2vfUW4:YZ4XoBKHc9AuM73gQDvfUW4

    • Skuld family

    • Skuld stealer

      An info stealer written in Go lang.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v16

Tasks