General

  • Target

    SCAN_Wells Fargo bank payment.exe

  • Size

    912KB

  • Sample

    210727-sg6xw6tywa

  • MD5

    e2e01c7a8e323e117cfc9c4cdf0ad1c2

  • SHA1

    ea718bc482d968f9db9577b8d9edb08e4f24abbd

  • SHA256

    e8b4e90cb7a9233231088d027c2c090aafc143c77e1f46d34d6b206c2c797419

  • SHA512

    53a677c7e4f2968319c5d464446e7c777c9b7f61fed01cf5225c121fea661b65c24dc358d52fece233b24db18b1fd1d95d4bc580860c93bb803c77a87c260215

Malware Config

Extracted

Family

oski

C2

mmcjo.com/crown/

Targets

    • Target

      SCAN_Wells Fargo bank payment.exe

    • Size

      912KB

    • MD5

      e2e01c7a8e323e117cfc9c4cdf0ad1c2

    • SHA1

      ea718bc482d968f9db9577b8d9edb08e4f24abbd

    • SHA256

      e8b4e90cb7a9233231088d027c2c090aafc143c77e1f46d34d6b206c2c797419

    • SHA512

      53a677c7e4f2968319c5d464446e7c777c9b7f61fed01cf5225c121fea661b65c24dc358d52fece233b24db18b1fd1d95d4bc580860c93bb803c77a87c260215

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks