General

  • Target

    99bb29228fae968289f88e3bcf86089595e9dcb9dacbd6602258650173d173d8

  • Size

    1.1MB

  • Sample

    220708-rq4bqsfgc9

  • MD5

    a0291b1ed41752bc89ab183ad8d77d4f

  • SHA1

    34b27a804f354423978fac88c9b6eea3bdb92cae

  • SHA256

    99bb29228fae968289f88e3bcf86089595e9dcb9dacbd6602258650173d173d8

  • SHA512

    8dbcc8e05a655f52e4160259133e44c0b6d45788b1d493602c61eeaff6e3d1f71882057f50c5679b573727a3bb98a6b78718c53f8f1519ebe8dc0f3fc9f50e27

Score
10/10

Malware Config

Extracted

Family

oski

C2

45.12.215.204

Targets

    • Target

      99bb29228fae968289f88e3bcf86089595e9dcb9dacbd6602258650173d173d8

    • Size

      1.1MB

    • MD5

      a0291b1ed41752bc89ab183ad8d77d4f

    • SHA1

      34b27a804f354423978fac88c9b6eea3bdb92cae

    • SHA256

      99bb29228fae968289f88e3bcf86089595e9dcb9dacbd6602258650173d173d8

    • SHA512

      8dbcc8e05a655f52e4160259133e44c0b6d45788b1d493602c61eeaff6e3d1f71882057f50c5679b573727a3bb98a6b78718c53f8f1519ebe8dc0f3fc9f50e27

    Score
    10/10
    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks