General

  • Target

    payment advice.exe

  • Size

    273KB

  • Sample

    220513-j8zghadgb2

  • MD5

    f6383fce1ab0d6597440259f9a1e9ddc

  • SHA1

    247a6817bb354c0784f7a112c953646d509bd120

  • SHA256

    ae672a54491d01385af7932cc9524889f6314dd4b4b8b9a846dfa1ffedaa8c61

  • SHA512

    be90fef64aa2343a93456e6879465c3a5c1855490fd472b8f5a25e6c1db558798fc6fd727f00bc79d4b2e97bb91c57024e8f5178adb94ab4e72dcad83753e959

Malware Config

Extracted

Family

oski

C2

spetralnet2.com

Targets

    • Target

      payment advice.exe

    • Size

      273KB

    • MD5

      f6383fce1ab0d6597440259f9a1e9ddc

    • SHA1

      247a6817bb354c0784f7a112c953646d509bd120

    • SHA256

      ae672a54491d01385af7932cc9524889f6314dd4b4b8b9a846dfa1ffedaa8c61

    • SHA512

      be90fef64aa2343a93456e6879465c3a5c1855490fd472b8f5a25e6c1db558798fc6fd727f00bc79d4b2e97bb91c57024e8f5178adb94ab4e72dcad83753e959

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks