General
-
Target
bb12e61f99f6c7b2d4c8702d02dec5d9.exe
-
Size
200KB
-
Sample
220704-a6zj2sdgcm
-
MD5
bb12e61f99f6c7b2d4c8702d02dec5d9
-
SHA1
3924763176734ee12f708a7f0fdd05f49c473ac4
-
SHA256
fb0901c0241896831cac8f3e139c461ae327fc884812d3a206d4e0b8b7931a2e
-
SHA512
49f6e0ac1ffc8638f8116f5e5d5e3a9548ced2f788638f370bba55225184d71bf1e10e9c8a12aff3911a40b228f337a1bfeb20fc3394e2630601d0b2cd709220
Static task
static1
Behavioral task
behavioral1
Sample
bb12e61f99f6c7b2d4c8702d02dec5d9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bb12e61f99f6c7b2d4c8702d02dec5d9.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
oski
ipc-nena.net/oski/
Targets
-
-
Target
bb12e61f99f6c7b2d4c8702d02dec5d9.exe
-
Size
200KB
-
MD5
bb12e61f99f6c7b2d4c8702d02dec5d9
-
SHA1
3924763176734ee12f708a7f0fdd05f49c473ac4
-
SHA256
fb0901c0241896831cac8f3e139c461ae327fc884812d3a206d4e0b8b7931a2e
-
SHA512
49f6e0ac1ffc8638f8116f5e5d5e3a9548ced2f788638f370bba55225184d71bf1e10e9c8a12aff3911a40b228f337a1bfeb20fc3394e2630601d0b2cd709220
Score10/10-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-