General

  • Target

    c0fa9b79d5ff08641d2490f2942b205120e157e790bfb7540aaed7a0e69a1d49

  • Size

    200KB

  • Sample

    210722-s6ths7fkk6

  • MD5

    9c75d0a696028660f0f7333c2d3f5d8a

  • SHA1

    3a3f86412b3d48bf9bf4f73fac3fc0d6c2a49293

  • SHA256

    c0fa9b79d5ff08641d2490f2942b205120e157e790bfb7540aaed7a0e69a1d49

  • SHA512

    58b1494fb5455e761ca99fdc80c6b648f23d1183355c0742ceb134bd0ac77a37385e736014319a1f801644ea741fab1ba9babb7b4323660f55870263c33bb000

Malware Config

Extracted

Family

oski

C2

103.153.76.164/we/mar2/

Targets

    • Target

      c0fa9b79d5ff08641d2490f2942b205120e157e790bfb7540aaed7a0e69a1d49

    • Size

      200KB

    • MD5

      9c75d0a696028660f0f7333c2d3f5d8a

    • SHA1

      3a3f86412b3d48bf9bf4f73fac3fc0d6c2a49293

    • SHA256

      c0fa9b79d5ff08641d2490f2942b205120e157e790bfb7540aaed7a0e69a1d49

    • SHA512

      58b1494fb5455e761ca99fdc80c6b648f23d1183355c0742ceb134bd0ac77a37385e736014319a1f801644ea741fab1ba9babb7b4323660f55870263c33bb000

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks