General
-
Target
83658386973AE413A292F94C08CFE9D8CDA632936F5C5.exe
-
Size
597KB
-
Sample
220520-xaldwafbfn
-
MD5
a3ff3440bbcb756cd03d4f58e315e0df
-
SHA1
ddbe7cea75ce267103a60affcf26fec32c381499
-
SHA256
83658386973ae413a292f94c08cfe9d8cda632936f5c509110b0d27b3cab576e
-
SHA512
8b6665bd03ad7498043fc29b2626e2f2d08192e68088ce1c510f1ed1a0422b3ee4eb2cdc6ed237a0bbe02dd6e2ec4983239cec107a62c3746373f2a20c9b91a5
Static task
static1
Behavioral task
behavioral1
Sample
83658386973AE413A292F94C08CFE9D8CDA632936F5C5.exe
Resource
win7-20220414-en
Malware Config
Extracted
oski
any.anycarservice.ae
Targets
-
-
Target
83658386973AE413A292F94C08CFE9D8CDA632936F5C5.exe
-
Size
597KB
-
MD5
a3ff3440bbcb756cd03d4f58e315e0df
-
SHA1
ddbe7cea75ce267103a60affcf26fec32c381499
-
SHA256
83658386973ae413a292f94c08cfe9d8cda632936f5c509110b0d27b3cab576e
-
SHA512
8b6665bd03ad7498043fc29b2626e2f2d08192e68088ce1c510f1ed1a0422b3ee4eb2cdc6ed237a0bbe02dd6e2ec4983239cec107a62c3746373f2a20c9b91a5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-