General

  • Target

    FLP_5012_306_171.exe

  • Size

    379KB

  • Sample

    220611-t3aajaccd8

  • MD5

    a746c90dae245470777071a6c41dea07

  • SHA1

    b9c256cb78dd83ff0ae5fe6755ff2e28096ff11d

  • SHA256

    7376932014797e4b7f5a1c4776d865e1ba03cba69d9811f11a449c188157c918

  • SHA512

    0e6717ade6830232c61650ad4e68334682b11aa0792bae093d62ba3f7ccb2a3371c84536a16f11c971160965df714f687a5b4d5aa52c8f8eb2dc01548e12b61a

Malware Config

Extracted

Family

oski

C2

5azc.xyz

Targets

    • Target

      FLP_5012_306_171.exe

    • Size

      379KB

    • MD5

      a746c90dae245470777071a6c41dea07

    • SHA1

      b9c256cb78dd83ff0ae5fe6755ff2e28096ff11d

    • SHA256

      7376932014797e4b7f5a1c4776d865e1ba03cba69d9811f11a449c188157c918

    • SHA512

      0e6717ade6830232c61650ad4e68334682b11aa0792bae093d62ba3f7ccb2a3371c84536a16f11c971160965df714f687a5b4d5aa52c8f8eb2dc01548e12b61a

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks