Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 18:48
Behavioral task
behavioral1
Sample
2024-02-21_c16675b62df577a2b4aa0b74ad5320a5_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-21_c16675b62df577a2b4aa0b74ad5320a5_karagany_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-21_c16675b62df577a2b4aa0b74ad5320a5_karagany_mafia.exe
-
Size
252KB
-
MD5
c16675b62df577a2b4aa0b74ad5320a5
-
SHA1
375bdec65f9863a5c6bd26ddf9a6065a7221c5ac
-
SHA256
5d7fa6a60738d15ddaa17d8cd3fea351eefd74fda4d753720cbf1aa1045baf18
-
SHA512
819182e1282c5ad4b6e2541b59e978a649d69907b03d8789cc0131c2987ebddc661e839761a815fec9180f0c32b06979848ecc7d565c33a2314eae2b8556ecec
-
SSDEEP
6144:WfUauY68uSWCx+XA7mg2pND1Ljo3crEHc39h:WwY68u1Cx+wm/pvsh+
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1436 4668 WerFault.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_c16675b62df577a2b4aa0b74ad5320a5_karagany_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_c16675b62df577a2b4aa0b74ad5320a5_karagany_mafia.exe"1⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 11602⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4668 -ip 46681⤵PID:4348