General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.18479.7322

  • Size

    600KB

  • Sample

    220517-ktvqfacceq

  • MD5

    4ffb6091ba5ec0d9ca7bd79107ca6fae

  • SHA1

    5eaf10eec6cbbace9fa89f191c8d95a477041067

  • SHA256

    b990b5f072914cba8f10f88932ce5be9feff9760f7a1a20d562f885915ca9423

  • SHA512

    7bf47313d95604c64d5a0424cc5b7cac79d8200bf7ffa6d604e07a98c88365d5bcee82fef4f13d04265c9652823479d9add0dbc4bb2d8a8803054800d3b184a9

Malware Config

Extracted

Family

oski

C2

unitech.co.vu

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.18479.7322

    • Size

      600KB

    • MD5

      4ffb6091ba5ec0d9ca7bd79107ca6fae

    • SHA1

      5eaf10eec6cbbace9fa89f191c8d95a477041067

    • SHA256

      b990b5f072914cba8f10f88932ce5be9feff9760f7a1a20d562f885915ca9423

    • SHA512

      7bf47313d95604c64d5a0424cc5b7cac79d8200bf7ffa6d604e07a98c88365d5bcee82fef4f13d04265c9652823479d9add0dbc4bb2d8a8803054800d3b184a9

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks