General

  • Target

    add219d5aa50133ae767e3adbc531ddd39dc042921d5a2c99f20e101f5496cac

  • Size

    962KB

  • Sample

    220414-q94aeaegf8

  • MD5

    74b4520466a6a8fc92498441552b97cb

  • SHA1

    acb69357ac25cae78989d7a67a9466696b39221a

  • SHA256

    add219d5aa50133ae767e3adbc531ddd39dc042921d5a2c99f20e101f5496cac

  • SHA512

    abde7f337a202fdc96c12b5e2d1850b2fb48c3e04a5398456503e9862c565116dbf116b04dac0087414634319919cb4109bde50b7f3273d15eb8d82608c37d03

Score
10/10

Malware Config

Extracted

Family

oski

C2

80.89.230.198

Targets

    • Target

      add219d5aa50133ae767e3adbc531ddd39dc042921d5a2c99f20e101f5496cac

    • Size

      962KB

    • MD5

      74b4520466a6a8fc92498441552b97cb

    • SHA1

      acb69357ac25cae78989d7a67a9466696b39221a

    • SHA256

      add219d5aa50133ae767e3adbc531ddd39dc042921d5a2c99f20e101f5496cac

    • SHA512

      abde7f337a202fdc96c12b5e2d1850b2fb48c3e04a5398456503e9862c565116dbf116b04dac0087414634319919cb4109bde50b7f3273d15eb8d82608c37d03

    Score
    10/10
    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks