General

  • Target

    0b32731672b0b86202d4e214b1cbe9e5.exe

  • Size

    200KB

  • Sample

    210811-6q5jcq6lrj

  • MD5

    0b32731672b0b86202d4e214b1cbe9e5

  • SHA1

    6d166d45a861bdbac5aa90c5658d380b0c284867

  • SHA256

    afa70711d77fb4d0d0800188567a53f94679be60dee00ec3b099829456aedf9b

  • SHA512

    4e93cb26fee0156ff88b692fcde3e6a8b09c4b0f777e5d914417d41c9e29a8c4640671c367f7bd171623de2583da613c60c80bfc5ec936f0f050ab1b93dc81d0

Malware Config

Extracted

Family

oski

C2

accdemo.axwebsite.com

Targets

    • Target

      0b32731672b0b86202d4e214b1cbe9e5.exe

    • Size

      200KB

    • MD5

      0b32731672b0b86202d4e214b1cbe9e5

    • SHA1

      6d166d45a861bdbac5aa90c5658d380b0c284867

    • SHA256

      afa70711d77fb4d0d0800188567a53f94679be60dee00ec3b099829456aedf9b

    • SHA512

      4e93cb26fee0156ff88b692fcde3e6a8b09c4b0f777e5d914417d41c9e29a8c4640671c367f7bd171623de2583da613c60c80bfc5ec936f0f050ab1b93dc81d0

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks