General

  • Target

    RFQ0722.xls

  • Size

    457KB

  • Sample

    220725-k4gassbgcm

  • MD5

    77358b120c49a00939b58f530827101b

  • SHA1

    0243ff329e56636195dc9f8e2c7e8e23ce9a4d88

  • SHA256

    9099f8ecee77fd796796c8a399a103dd35ad32d0a0c596045e96ec56b1836af2

  • SHA512

    a39b0c58cb52854f7ce8a9c2840687e9aba86271f8af5e40d416987749b7e5ebecd62ff0d3c1339006bc6bc56fa64ab183c163224c76c9402ef8dd50c2308043

Malware Config

Extracted

Family

oski

C2

manguerassorna.com

Targets

    • Target

      RFQ0722.xls

    • Size

      457KB

    • MD5

      77358b120c49a00939b58f530827101b

    • SHA1

      0243ff329e56636195dc9f8e2c7e8e23ce9a4d88

    • SHA256

      9099f8ecee77fd796796c8a399a103dd35ad32d0a0c596045e96ec56b1836af2

    • SHA512

      a39b0c58cb52854f7ce8a9c2840687e9aba86271f8af5e40d416987749b7e5ebecd62ff0d3c1339006bc6bc56fa64ab183c163224c76c9402ef8dd50c2308043

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

      suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks