General

  • Target

    https://www.upload.ee/files/14365900/Oski_Stealer.rar.html

  • Sample

    220916-ve5bfacabn

Malware Config

Extracted

Family

oski

C2

62.77.159.212

panel.com

Targets

    • Target

      https://www.upload.ee/files/14365900/Oski_Stealer.rar.html

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix

Command and Control

    Credential Access

    Defense Evasion

    Execution

      Exfiltration

        Impact

          Initial Access

            Lateral Movement

              Persistence

                Privilege Escalation

                  Tasks