Resubmissions

08-06-2022 14:06

220608-regzcsaebr 10

08-06-2022 13:56

220608-q8y93adhf6 10

General

  • Target

    invoice for payment.exe

  • Size

    65KB

  • Sample

    220608-q8y93adhf6

  • MD5

    197043d984533ac65f82611414d32792

  • SHA1

    799b97ec3adc652ff5cf89df6852e6c535e833d9

  • SHA256

    89ec309c384717284199d66d01669738ce37d9fb445a8f7f2259dfd6ca888f5d

  • SHA512

    94c19f18c3aaa0bcb4f37f07aad2ab92863d303fe1e9083c4f73a6b71d47f001701a81aa111c3646cc1c33a21b9d00f883a654b1e3ccdbb39fd5764d30d6cab1

Malware Config

Extracted

Family

oski

C2

yungfang.co.vu

Targets

    • Target

      invoice for payment.exe

    • Size

      65KB

    • MD5

      197043d984533ac65f82611414d32792

    • SHA1

      799b97ec3adc652ff5cf89df6852e6c535e833d9

    • SHA256

      89ec309c384717284199d66d01669738ce37d9fb445a8f7f2259dfd6ca888f5d

    • SHA512

      94c19f18c3aaa0bcb4f37f07aad2ab92863d303fe1e9083c4f73a6b71d47f001701a81aa111c3646cc1c33a21b9d00f883a654b1e3ccdbb39fd5764d30d6cab1

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks