General

  • Target

    5753388fbfcde9e08d00ac9e2be5d881.exe

  • Size

    245KB

  • Sample

    210504-e1ca4a8bc6

  • MD5

    5753388fbfcde9e08d00ac9e2be5d881

  • SHA1

    48e8a88ca75782489db9b5da0dff11f050a7a4e0

  • SHA256

    d346665dc0a3c37256f313f6e9e41c254acf70c599d007f1391128c4b3771ce6

  • SHA512

    483bfd819158b38e996780c3d59ee22b3a3d372d1cd38bfa68dc817370663da0978f259c836df42f5c2f5e3fd7ee9217d7f185664678c575c24a2f131226bad7

Malware Config

Extracted

Family

oski

C2

198.98.60.43

Targets

    • Target

      5753388fbfcde9e08d00ac9e2be5d881.exe

    • Size

      245KB

    • MD5

      5753388fbfcde9e08d00ac9e2be5d881

    • SHA1

      48e8a88ca75782489db9b5da0dff11f050a7a4e0

    • SHA256

      d346665dc0a3c37256f313f6e9e41c254acf70c599d007f1391128c4b3771ce6

    • SHA512

      483bfd819158b38e996780c3d59ee22b3a3d372d1cd38bfa68dc817370663da0978f259c836df42f5c2f5e3fd7ee9217d7f185664678c575c24a2f131226bad7

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks