General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.46212578.16723.14032

  • Size

    765KB

  • Sample

    210503-2gbfzl2sgx

  • MD5

    090148a4d527120eaaa7d5d2f0aa5bf1

  • SHA1

    a5c6148505c3707580947351e9d07062979bb05d

  • SHA256

    6bbdcec0763847706f9b75674aad231ff23afd2b212138fc630a86f69f8180d8

  • SHA512

    48b9c690c51920e0119899f509d627e82866b004f456481a22e25a86d507568535e0bb858241ed8b376bc29221a233d3335cc951f694f2303423d2385aa23399

Malware Config

Extracted

Family

oski

C2

205.185.120.57

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.46212578.16723.14032

    • Size

      765KB

    • MD5

      090148a4d527120eaaa7d5d2f0aa5bf1

    • SHA1

      a5c6148505c3707580947351e9d07062979bb05d

    • SHA256

      6bbdcec0763847706f9b75674aad231ff23afd2b212138fc630a86f69f8180d8

    • SHA512

      48b9c690c51920e0119899f509d627e82866b004f456481a22e25a86d507568535e0bb858241ed8b376bc29221a233d3335cc951f694f2303423d2385aa23399

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks