General

  • Target

    7583016122.zip

  • Size

    799KB

  • Sample

    220614-1q4ryaefcm

  • MD5

    548901fecc9f961a0c424ebc26269c11

  • SHA1

    41e23672797ce62b86ace068faaff6d6a3bb871c

  • SHA256

    4c51a9f2c247d7a7d027a9b5a440f7cbe1a7d85b23f5d2a803f6548e4f7100c5

  • SHA512

    1d5e272a2052249db3d70ba1f6db4168f42ba0e619ce6e13ecd62b576cbb47db52d3cd9f3fb3387408554fd509859e3937f668a13c50f0a81f1ca724a5932113

Score
10/10

Malware Config

Extracted

Family

oski

C2

ibroot.com

Targets

    • Target

      0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f

    • Size

      1.2MB

    • MD5

      61bca80732c3e682e00fb4bd8c48d52b

    • SHA1

      f32a21133c750d1c26e412b305b32110d281a981

    • SHA256

      0e99aef5608c3357e1425734aad75eaff3d241c1676d5af60cd3c9c43dd1441f

    • SHA512

      498efd615df973793d222bf55573499199b6c1d775b58a0c0c6eb2b94eb8234f6c263156c651e5084eede2bf6d0589500fc375c16728d32ef324be4eb354bca1

    Score
    10/10
    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks