General

  • Target

    bed5b9eae040bc5c251d0b025761373131dc12754660e6be4aa5b1c1d302f4ff

  • Size

    455KB

  • Sample

    201106-q8aselvkre

  • MD5

    77f6eb1421150e7d442a52023db4f754

  • SHA1

    65fed9203ae5e688527350b9517a8e57fc1c8b25

  • SHA256

    bed5b9eae040bc5c251d0b025761373131dc12754660e6be4aa5b1c1d302f4ff

  • SHA512

    385d4ab6c3d2ca058c026f315b80c9b0699337878fb547b3716a9db747224a3876da64124dadad207e776a96e3d30b5835e2dbd7124406a1db8757a95e8da3bd

Malware Config

Extracted

Family

oski

C2

45.12.215.204

Targets

    • Target

      bed5b9eae040bc5c251d0b025761373131dc12754660e6be4aa5b1c1d302f4ff

    • Size

      455KB

    • MD5

      77f6eb1421150e7d442a52023db4f754

    • SHA1

      65fed9203ae5e688527350b9517a8e57fc1c8b25

    • SHA256

      bed5b9eae040bc5c251d0b025761373131dc12754660e6be4aa5b1c1d302f4ff

    • SHA512

      385d4ab6c3d2ca058c026f315b80c9b0699337878fb547b3716a9db747224a3876da64124dadad207e776a96e3d30b5835e2dbd7124406a1db8757a95e8da3bd

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks