General

  • Target

    08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877

  • Size

    2.1MB

  • Sample

    220524-q2lemadab7

  • MD5

    9fa5bfb2a6fa702ef279ff02924a2282

  • SHA1

    f9f79b47d6dca30b6ed0cc94636b299923e10eda

  • SHA256

    08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877

  • SHA512

    d796083383e4bddaf7946fb6a8dceeef515e08bb84580138a962a4190facae39f79bd0564f8f9c21674e694105cdcdbc2af79371db2bc8ed2cd43273f7f0af6c

Malware Config

Extracted

Family

oski

C2

hostisgerhg.tk

Targets

    • Target

      08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877

    • Size

      2.1MB

    • MD5

      9fa5bfb2a6fa702ef279ff02924a2282

    • SHA1

      f9f79b47d6dca30b6ed0cc94636b299923e10eda

    • SHA256

      08167401255c540fed1d03109911cc841a05324958233cee0a798a0b13fdc877

    • SHA512

      d796083383e4bddaf7946fb6a8dceeef515e08bb84580138a962a4190facae39f79bd0564f8f9c21674e694105cdcdbc2af79371db2bc8ed2cd43273f7f0af6c

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks