General

  • Target

    9f8cae0fd09b8ff1d87a5cc9c1ea7fa6

  • Size

    1.9MB

  • Sample

    240216-f5f9zaae7x

  • MD5

    9f8cae0fd09b8ff1d87a5cc9c1ea7fa6

  • SHA1

    1e8c942f7804de31a32af230828a59d0b65e4041

  • SHA256

    80d5be2fd677e4bec23d07a9e56607c9f204731184163767951e585aab683dd7

  • SHA512

    4d6fdea2e71dee55d8ca21f828194e4bc4cfc7c053bedf534fbfbd0b85f9696d1862236f53636dbbb765027c4c5e789173e6dfd1cb528eff1bf2ad1942173b0b

  • SSDEEP

    24576:v86mOmxVc5GdjjISb2Wldt7iY2Msaf7oLX9aeU13UkBz0Dmi7pFhPIJUjPeimAUD:U6C5t2YNTf7FViqYK

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

oski

C2

himarkh.xyz

Targets

    • Target

      PO# HM00050746 13461-001,xls.xll

    • Size

      1.4MB

    • MD5

      a719b4a9d08553ff7683ddcb7003d68b

    • SHA1

      9039d4c0ed993549537bcf365fe35c553bd2ba50

    • SHA256

      fd042d218a6adcb4d496f6d0e9f6fb3dfabdc24bc8bc86681480d76597ec258b

    • SHA512

      74d52ac5dda28962ddceacc7df9da371f56401ef82fbcbc77fc900bb4608574e308eec97b654b1bd781b2ad588ac79daf0166fb10604e0305768aa069f5043c7

    • SSDEEP

      24576:BzbGHAzHAjX1QcLg0jHe6GxAo594f7Byqx90KdI9K9nktTpcA+kukY:BziHICE0j+6GKoj49V989KVCiHlkY

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks