General

  • Target

    PO-20892.ppt

  • Size

    58KB

  • Sample

    210713-jf2yyts3vs

  • MD5

    d728d510f2b3020f9f5966787d11097d

  • SHA1

    fad2d76eacde97742c9147a0b9ce02b1d672b4a5

  • SHA256

    32397c143bd1d84c30ddda892b0f2e13f97ab22bfbc266738ffa7f369c97ea81

  • SHA512

    47b790535f92a579c364c5948c0fa57db42fa74ff82b7eed5d11a04411bbc014671ba5561ef00b94eb0c0d29d190575d0b067ddc073c99e5ba2d29c94d221773

Malware Config

Extracted

Family

oski

C2

103.153.76.164/we/qw/

Targets

    • Target

      PO-20892.ppt

    • Size

      58KB

    • MD5

      d728d510f2b3020f9f5966787d11097d

    • SHA1

      fad2d76eacde97742c9147a0b9ce02b1d672b4a5

    • SHA256

      32397c143bd1d84c30ddda892b0f2e13f97ab22bfbc266738ffa7f369c97ea81

    • SHA512

      47b790535f92a579c364c5948c0fa57db42fa74ff82b7eed5d11a04411bbc014671ba5561ef00b94eb0c0d29d190575d0b067ddc073c99e5ba2d29c94d221773

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Tasks