General

  • Target

    booking.exe

  • Size

    258KB

  • Sample

    210511-yj6kwvc8j6

  • MD5

    3ea68451bc134bea97313a13587b7841

  • SHA1

    f75536e5d9e174aa2d2e75521c134c03a720b93b

  • SHA256

    b5b4f2430ee5b5348b55a2d1be3e1bf5f88094e67409bbb88d6e677da91c8482

  • SHA512

    e0f3afd0a7daffdb23650ce2731a107db0b6d303fd2cce82d9ecfee0a9cf41f3c000d215cc6160b1fcaeb1c722c207c92ec2190e13a6f34b9c8226852295ac80

Malware Config

Extracted

Family

oski

C2

45.144.225.52

Targets

    • Target

      booking.exe

    • Size

      258KB

    • MD5

      3ea68451bc134bea97313a13587b7841

    • SHA1

      f75536e5d9e174aa2d2e75521c134c03a720b93b

    • SHA256

      b5b4f2430ee5b5348b55a2d1be3e1bf5f88094e67409bbb88d6e677da91c8482

    • SHA512

      e0f3afd0a7daffdb23650ce2731a107db0b6d303fd2cce82d9ecfee0a9cf41f3c000d215cc6160b1fcaeb1c722c207c92ec2190e13a6f34b9c8226852295ac80

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks