General

  • Target

    938f4e648e57b9ad6d41ea3fe8707c0f249ba2baa24a5.exe

  • Size

    470KB

  • Sample

    220726-w8w3lafhe4

  • MD5

    b0d0a4af8f13d80eafe1238bd3f684c8

  • SHA1

    23f10ff96e9933590fb9c384c543d20ab695733f

  • SHA256

    938f4e648e57b9ad6d41ea3fe8707c0f249ba2baa24a5af557b4f09d698b8145

  • SHA512

    5c5297e21c1a37d72894cd232a0833c917d886fb2f8aae9015a41b986a8c4738d90372181cfad5d1bb2584e9b4fbfa2a719752f2973629e42cd562487cdbeffd

Malware Config

Extracted

Family

oski

C2

manguerassorna.com

Targets

    • Target

      938f4e648e57b9ad6d41ea3fe8707c0f249ba2baa24a5.exe

    • Size

      470KB

    • MD5

      b0d0a4af8f13d80eafe1238bd3f684c8

    • SHA1

      23f10ff96e9933590fb9c384c543d20ab695733f

    • SHA256

      938f4e648e57b9ad6d41ea3fe8707c0f249ba2baa24a5af557b4f09d698b8145

    • SHA512

      5c5297e21c1a37d72894cd232a0833c917d886fb2f8aae9015a41b986a8c4738d90372181cfad5d1bb2584e9b4fbfa2a719752f2973629e42cd562487cdbeffd

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks