General

  • Target

    6183631814033408.zip

  • Size

    274KB

  • Sample

    211129-twy1bacddr

  • MD5

    7851798afd621c0540c6661267e07d3b

  • SHA1

    de472c61fd3211abe31bf855b758540d696ebb86

  • SHA256

    1205ff704d6dc1efc0a09c708a5e1fee891656497917cdbdad03306102abb407

  • SHA512

    cb09ec9faa8acc04cb7d06a83fe88a3314a181049c803d7b56c565e3be124886cd87fbe894753d7bd63209b9c9be59e8e4c90bb98dba4d63257dae25e1079b9a

Malware Config

Extracted

Family

oski

C2

datafishers.club

Targets

    • Target

      3825e98d175412654d7f6dd6089c59d603eb1e2cd3ea3746a221aaae42dcab56

    • Size

      609KB

    • MD5

      57eb53676024058c2c05bf2fd22aecaf

    • SHA1

      6accbb2957dfb1c6eb55a52dcf7170a547b48a58

    • SHA256

      3825e98d175412654d7f6dd6089c59d603eb1e2cd3ea3746a221aaae42dcab56

    • SHA512

      7bef54c5c1c283b8d82d47b26169ffa608beb9dee1d5e356c41c3bcfc3e60cc08c295855338ff93156080efe79da3aced16bc2861de4730b7a0c17130ff5d190

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks