General

  • Target

    _G019 & G022 SPEC SHEET.zip

  • Size

    232KB

  • Sample

    210422-l71sepgyd6

  • MD5

    a5cfe2d473bacd4347664da91fdf0fa6

  • SHA1

    a63e1d1d27cacdcb208e3b1d056c2e04408429b8

  • SHA256

    8f59b3a4052fdcf82cab109c7d8eb0b9d3221ce6b5c990acbeaf0d51e206855c

  • SHA512

    47c4ac4759ea0ea6966047340ad4f7d3b16fef070f143ae3c18154e7e15f9bf5ab312382639797b965adfbeffeea0412b18813b4f6192377e4f265dd3fb7356b

Malware Config

Extracted

Family

oski

C2

45.144.225.118

Extracted

Family

azorult

C2

http://lexusbiscuit.com/OiuBn/index.php

Targets

    • Target

      G019 & G022 SPEC SHEET.exe

    • Size

      245KB

    • MD5

      c91aa9b71b9c9e496f38e13de6b56211

    • SHA1

      8d405cb844a222c632009435cbf7ab3aa82e09d5

    • SHA256

      f03142ed5b5aa4e86483adfb17f5983ae83a61bc20d074d9aa84713ba4779ca4

    • SHA512

      3725e35661e71b01ea5da974c6358754ae7d4d84e608e7ce541182da65d6d1aed2c8d7dc91970a2e9ef89f8505037721ddf858dc9233192ec3317b5ab8c70f7b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

5
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

5
T1005

Tasks