General

  • Target

    Sample_price list_new order.exe

  • Size

    643KB

  • Sample

    220612-rv9z3sbbb7

  • MD5

    d5ad3655ac02936e060e384f1078c7f5

  • SHA1

    39448e2ba7f287ecf60f95589072ddcf7cdc0369

  • SHA256

    2213c9b915e45237c418089f12469a32144e7bd18bb1a79ada1f45b861d56518

  • SHA512

    c36d8376276a964ea818df17c9233fa75745de84d33ddd6d0e21260acd760980f106fa747f6d51d3623e1b4c329e10e48fabff8bcd97fbba57ad348bf3ccde93

Malware Config

Extracted

Family

oski

C2

masterwork2.co.vu

Targets

    • Target

      Sample_price list_new order.exe

    • Size

      643KB

    • MD5

      d5ad3655ac02936e060e384f1078c7f5

    • SHA1

      39448e2ba7f287ecf60f95589072ddcf7cdc0369

    • SHA256

      2213c9b915e45237c418089f12469a32144e7bd18bb1a79ada1f45b861d56518

    • SHA512

      c36d8376276a964ea818df17c9233fa75745de84d33ddd6d0e21260acd760980f106fa747f6d51d3623e1b4c329e10e48fabff8bcd97fbba57ad348bf3ccde93

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks