General
-
Target
6189_1647697417_3623.exe
-
Size
200KB
-
Sample
220325-h8z8csgdgk
-
MD5
976d2ac418b0ab2b953df538c2d340db
-
SHA1
d246fa7fbe13895ba7eda0a7be4f3403b9365147
-
SHA256
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8
-
SHA512
9ed8dcdfb6a0b016d6d92a4bfe1aac77791733821434e4df568952035e13026280347eb24d82235d2e2988ce285001fea5685ec88e29fda744f1325f07c4b76a
Static task
static1
Behavioral task
behavioral1
Sample
6189_1647697417_3623.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
6189_1647697417_3623.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
oski
wellsfargocs.ddns.us
Targets
-
-
Target
6189_1647697417_3623.exe
-
Size
200KB
-
MD5
976d2ac418b0ab2b953df538c2d340db
-
SHA1
d246fa7fbe13895ba7eda0a7be4f3403b9365147
-
SHA256
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8
-
SHA512
9ed8dcdfb6a0b016d6d92a4bfe1aac77791733821434e4df568952035e13026280347eb24d82235d2e2988ce285001fea5685ec88e29fda744f1325f07c4b76a
Score10/10-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-