General

  • Target

    DHL Shipments Docs Arrival.exe

  • Size

    419KB

  • Sample

    210420-dteeykwkrj

  • MD5

    64e7c59ace47ccf1a97eedaf751e343c

  • SHA1

    56f17882965d10fdc10643b38f224799ce26ce26

  • SHA256

    e8c024453b4ea2c8deae99a076086cc051cb6d52453e8ba9a6316d4e7cb6a783

  • SHA512

    865eac96134348888b76db6d94b19d88009854055ace13a3f2147e27dc5d6a2f8a72a7b0cb92c23090ff0801955f4eed55390cfbd5a66816a0b839f3e0e41e18

Malware Config

Extracted

Family

oski

C2

31.210.20.228

Targets

    • Target

      DHL Shipments Docs Arrival.exe

    • Size

      419KB

    • MD5

      64e7c59ace47ccf1a97eedaf751e343c

    • SHA1

      56f17882965d10fdc10643b38f224799ce26ce26

    • SHA256

      e8c024453b4ea2c8deae99a076086cc051cb6d52453e8ba9a6316d4e7cb6a783

    • SHA512

      865eac96134348888b76db6d94b19d88009854055ace13a3f2147e27dc5d6a2f8a72a7b0cb92c23090ff0801955f4eed55390cfbd5a66816a0b839f3e0e41e18

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks