General

  • Target

    CTYH 53069184.exe

  • Size

    622KB

  • Sample

    211130-r4qmssfbhq

  • MD5

    8f3fb2446099de27ca50c13ad0d80245

  • SHA1

    04bf820780ced24814bf9a8ac4628f336a8cf596

  • SHA256

    b1fb8aca24889f4446865d60a21b47b5214cebff2ee9f797ae49b7b3885b2cff

  • SHA512

    79933bc3a0382f2417904955f1d4332f456a1ba72a30cddd406585096cdfd03dd6e545861bb4a1f6b5e9803588810e41f4b162d9378489b9bfedf4f3c7b1fe49

Malware Config

Extracted

Family

oski

C2

tecnomedica.com.py

Targets

    • Target

      CTYH 53069184.exe

    • Size

      622KB

    • MD5

      8f3fb2446099de27ca50c13ad0d80245

    • SHA1

      04bf820780ced24814bf9a8ac4628f336a8cf596

    • SHA256

      b1fb8aca24889f4446865d60a21b47b5214cebff2ee9f797ae49b7b3885b2cff

    • SHA512

      79933bc3a0382f2417904955f1d4332f456a1ba72a30cddd406585096cdfd03dd6e545861bb4a1f6b5e9803588810e41f4b162d9378489b9bfedf4f3c7b1fe49

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks