General

  • Target

    4b6c775d7fb678a0ad13a1de72f95e3bb26364748cd152365bc57295e9eaea70

  • Size

    224KB

  • Sample

    220712-l1j3ysdbcj

  • MD5

    1627230e72f02d43b9018b1f4a94dec0

  • SHA1

    9e25ba88dde302b1e10d8b8983711c20bff07e4e

  • SHA256

    4b6c775d7fb678a0ad13a1de72f95e3bb26364748cd152365bc57295e9eaea70

  • SHA512

    ac4f68e163b8fd253728614383dd67f3aa8ffc0a937086f358abc514e6a60e680848020a7094fc13bca94e92649b88c9d12751d3282330f6f44cc3a26b8d04ad

Malware Config

Extracted

Family

oski

C2

raymond.ug

Targets

    • Target

      4b6c775d7fb678a0ad13a1de72f95e3bb26364748cd152365bc57295e9eaea70

    • Size

      224KB

    • MD5

      1627230e72f02d43b9018b1f4a94dec0

    • SHA1

      9e25ba88dde302b1e10d8b8983711c20bff07e4e

    • SHA256

      4b6c775d7fb678a0ad13a1de72f95e3bb26364748cd152365bc57295e9eaea70

    • SHA512

      ac4f68e163b8fd253728614383dd67f3aa8ffc0a937086f358abc514e6a60e680848020a7094fc13bca94e92649b88c9d12751d3282330f6f44cc3a26b8d04ad

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks