General

  • Target

    b90d80620620b949c860a2818898540744bfa1d3637c27cfd69bbdee9cf81b98

  • Size

    708KB

  • Sample

    220325-1thzmscha5

  • MD5

    19a3ae83eb3e5307b1f2a263326a711b

  • SHA1

    75edb08baa3444eb45ccfac2f2de413492315644

  • SHA256

    b90d80620620b949c860a2818898540744bfa1d3637c27cfd69bbdee9cf81b98

  • SHA512

    7e1fe711c8731d43bf92851c389f94ccad8da6c186897ac0c82430525f0fa4678d0dae6f0da5cd423e8313e5db255a0457e83e7345874040e537fa6f8f849585

Score
10/10

Malware Config

Extracted

Family

oski

C2

morasergiov.ac.ug

Targets

    • Target

      b90d80620620b949c860a2818898540744bfa1d3637c27cfd69bbdee9cf81b98

    • Size

      708KB

    • MD5

      19a3ae83eb3e5307b1f2a263326a711b

    • SHA1

      75edb08baa3444eb45ccfac2f2de413492315644

    • SHA256

      b90d80620620b949c860a2818898540744bfa1d3637c27cfd69bbdee9cf81b98

    • SHA512

      7e1fe711c8731d43bf92851c389f94ccad8da6c186897ac0c82430525f0fa4678d0dae6f0da5cd423e8313e5db255a0457e83e7345874040e537fa6f8f849585

    Score
    10/10
    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks