General

  • Target

    8123aac5dc0fe0b39deb373191629bc5

  • Size

    1.9MB

  • Sample

    240129-3e642achh3

  • MD5

    8123aac5dc0fe0b39deb373191629bc5

  • SHA1

    de98c0797b990a46f5ff5b26e7126169fdb6f3cb

  • SHA256

    1f1e42adb9f46ac29b6ca7a75ec3ef3b111270bc978e6a17653b26f6fead7d2e

  • SHA512

    5ca85e2fc408522b36730aa0299ab1ccc5172a0c7c6efb869b826ca40ce082b9e496229ea19b6fdafcc8daaa3bcef24f1b36b9641442ade60f637210bfca675a

  • SSDEEP

    24576:B86mOmxVc5GdjjISb2Wldt7iY2Msaf7oLX9aeU13UkBz0Dmi7pFhPIJUjPeimAUa:i6C5t2YNTf7FViqYb

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

himarkh.xyz

Targets

    • Target

      PO# HM00050746 13461-001,xls.xll

    • Size

      1.4MB

    • MD5

      a719b4a9d08553ff7683ddcb7003d68b

    • SHA1

      9039d4c0ed993549537bcf365fe35c553bd2ba50

    • SHA256

      fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

    • SHA512

      74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

    • SSDEEP

      24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks