General

  • Target

    403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56

  • Size

    491KB

  • Sample

    220708-zekn9aaee8

  • MD5

    6800f4c8b2d1326dab120a6ad2b99ff6

  • SHA1

    d45ad1d4567dd41b9676885c1d7c5e5ef8fe5fc0

  • SHA256

    403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56

  • SHA512

    7bc232c8e430b21a962bc37e094df0a0400a04353f3f776dd851b4c8141caf949076c7537ad995cef536df768225103bb88cb437a9cd14f9218a2572c3f6a54b

Malware Config

Extracted

Family

oski

C2

a343345.me

Targets

    • Target

      403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56

    • Size

      491KB

    • MD5

      6800f4c8b2d1326dab120a6ad2b99ff6

    • SHA1

      d45ad1d4567dd41b9676885c1d7c5e5ef8fe5fc0

    • SHA256

      403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56

    • SHA512

      7bc232c8e430b21a962bc37e094df0a0400a04353f3f776dd851b4c8141caf949076c7537ad995cef536df768225103bb88cb437a9cd14f9218a2572c3f6a54b

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks