General

  • Target

    186150481a377bd29689e2b4c7bedb7cd41c9043f4bd7ce5ac25d9e4216aa8dd

  • Size

    200KB

  • Sample

    211116-w9mkjscaam

  • MD5

    fc2cec805baea261f034594150a624b2

  • SHA1

    27e67b2e091bb0bbafdd5890ae1afa763de07a71

  • SHA256

    186150481a377bd29689e2b4c7bedb7cd41c9043f4bd7ce5ac25d9e4216aa8dd

  • SHA512

    217b72ad55614ac510c3771f84e879844fae5b8be406094079d30498169223efad8860477ae237fc4cd32cc0f5ce7d2f99cfffafd93f1875f64efe6b61066264

Malware Config

Extracted

Family

oski

C2

jehovah-reigns.co.za

Targets

    • Target

      186150481a377bd29689e2b4c7bedb7cd41c9043f4bd7ce5ac25d9e4216aa8dd

    • Size

      200KB

    • MD5

      fc2cec805baea261f034594150a624b2

    • SHA1

      27e67b2e091bb0bbafdd5890ae1afa763de07a71

    • SHA256

      186150481a377bd29689e2b4c7bedb7cd41c9043f4bd7ce5ac25d9e4216aa8dd

    • SHA512

      217b72ad55614ac510c3771f84e879844fae5b8be406094079d30498169223efad8860477ae237fc4cd32cc0f5ce7d2f99cfffafd93f1875f64efe6b61066264

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks