General

  • Target

    DHL Shipments Docs Arrival.ace

  • Size

    263KB

  • Sample

    210420-fyyt5ea16n

  • MD5

    5035990a983101398fbee4830814e208

  • SHA1

    54bc2bfe92cfa7f71adcf691c9379858b7060f9f

  • SHA256

    911e53fd3af5fc8559ce5a0d3e3cb225ec4aeb50afe320a1befb1f952eedc572

  • SHA512

    42404f91cc9267f85bd937f57d1d51c28a0661e50b5d55beb864270f50d0dcd97ee36ace0a5f71ff192940924786b94b5091b03a417d3a3d78fab0de03e07272

Malware Config

Extracted

Family

oski

C2

31.210.20.228

Targets

    • Target

      DHL Shipments Docs Arrival.exe

    • Size

      419KB

    • MD5

      64e7c59ace47ccf1a97eedaf751e343c

    • SHA1

      56f17882965d10fdc10643b38f224799ce26ce26

    • SHA256

      e8c024453b4ea2c8deae99a076086cc051cb6d52453e8ba9a6316d4e7cb6a783

    • SHA512

      865eac96134348888b76db6d94b19d88009854055ace13a3f2147e27dc5d6a2f8a72a7b0cb92c23090ff0801955f4eed55390cfbd5a66816a0b839f3e0e41e18

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks