General

  • Target

    12ca573395abe2197dd8e264d780b988830337b1ba66723c2ced6a0ce51993ce

  • Size

    367KB

  • Sample

    211026-qe3qdshef6

  • MD5

    810a82f75517c167b50617cd983ba22a

  • SHA1

    a3c591f17077af53b6cc7ea0e935354ec7acd2b6

  • SHA256

    12ca573395abe2197dd8e264d780b988830337b1ba66723c2ced6a0ce51993ce

  • SHA512

    076f545324d840cc8e9d84f2d42c6893c42dfca61a572f912736c8cface7fb475db78488b3210457c1aa4b97d3e106b8db1285fa7dbeb9a1cbecf3157d7d2969

Malware Config

Extracted

Family

oski

C2

stanelectronics.xyz

Targets

    • Target

      12ca573395abe2197dd8e264d780b988830337b1ba66723c2ced6a0ce51993ce

    • Size

      367KB

    • MD5

      810a82f75517c167b50617cd983ba22a

    • SHA1

      a3c591f17077af53b6cc7ea0e935354ec7acd2b6

    • SHA256

      12ca573395abe2197dd8e264d780b988830337b1ba66723c2ced6a0ce51993ce

    • SHA512

      076f545324d840cc8e9d84f2d42c6893c42dfca61a572f912736c8cface7fb475db78488b3210457c1aa4b97d3e106b8db1285fa7dbeb9a1cbecf3157d7d2969

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks