General

  • Target

    Mfipdre.exe

  • Size

    304KB

  • Sample

    210414-53n6rahm62

  • MD5

    3061e2d44678262f26d3f68a419bea3a

  • SHA1

    546ad4d518a1ed317dee8bc1331249a10debebcc

  • SHA256

    db23d6f5e2123cde47f4e3178bf18063aa3270d13499991200c9074a837eff07

  • SHA512

    b397ba5f1e08e247ab3c3ca27877d6e8add173eea292621a38e45ad67bd01083676bce9a4752a4389db23c2bccefcbee356a0a7806d9aa2b3ede1e26b9cbc731

Malware Config

Extracted

Family

oski

C2

novget.com

Targets

    • Target

      Mfipdre.exe

    • Size

      304KB

    • MD5

      3061e2d44678262f26d3f68a419bea3a

    • SHA1

      546ad4d518a1ed317dee8bc1331249a10debebcc

    • SHA256

      db23d6f5e2123cde47f4e3178bf18063aa3270d13499991200c9074a837eff07

    • SHA512

      b397ba5f1e08e247ab3c3ca27877d6e8add173eea292621a38e45ad67bd01083676bce9a4752a4389db23c2bccefcbee356a0a7806d9aa2b3ede1e26b9cbc731

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks