General

  • Target

    66a1b49f893976a60ca25813345ea54a5582acf7a5a0821c03cc45bcfc89b5c5

  • Size

    533KB

  • Sample

    211027-tzhshaffb6

  • MD5

    1d901aa6dded4bdf5e3dcec4393e53ce

  • SHA1

    d85f4cf7ebf3bc594e303894fae9ae8c920ad4ad

  • SHA256

    66a1b49f893976a60ca25813345ea54a5582acf7a5a0821c03cc45bcfc89b5c5

  • SHA512

    db785cb7df4a216be3af6c90b51dfdcee60a599ea249aa721d507c36c2f5ae5a0cc26ddc87f01c0a8c3878aeb496341ee825590f8200a4501e9f848629c67489

Malware Config

Extracted

Family

oski

C2

gervenez.xyz

Targets

    • Target

      66a1b49f893976a60ca25813345ea54a5582acf7a5a0821c03cc45bcfc89b5c5

    • Size

      533KB

    • MD5

      1d901aa6dded4bdf5e3dcec4393e53ce

    • SHA1

      d85f4cf7ebf3bc594e303894fae9ae8c920ad4ad

    • SHA256

      66a1b49f893976a60ca25813345ea54a5582acf7a5a0821c03cc45bcfc89b5c5

    • SHA512

      db785cb7df4a216be3af6c90b51dfdcee60a599ea249aa721d507c36c2f5ae5a0cc26ddc87f01c0a8c3878aeb496341ee825590f8200a4501e9f848629c67489

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks