General

  • Target

    2024-07-25_eee333c1637253245c3fc51775ba7395_karagany_mafia_wapomi

  • Size

    216KB

  • Sample

    240725-l67ffasfjp

  • MD5

    eee333c1637253245c3fc51775ba7395

  • SHA1

    bd111eaf7f7687a87de02aa87acdde9d4cd51eb8

  • SHA256

    e5824681466b0a8b36f470252d644bc5a4333d83a8987021df491b471ef8d473

  • SHA512

    c3ad219bacb1c7fc2feb98848bbf61bd559ed9c6ec2ebfb9d4d7380fcd7b34a4f895be7b5f3ac3f588add74bcd8a4cefe6a9b58ad73310e862030ed0f942e087

  • SSDEEP

    3072:efUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIh1Xi6FLPo3cCGCH:efUauY68uSWCx+XA7mg2pNQ1Ljo3cj

Malware Config

Extracted

Family

oski

C2

wellsfargocs.ddns.us

Targets

    • Target

      2024-07-25_eee333c1637253245c3fc51775ba7395_karagany_mafia_wapomi

    • Size

      216KB

    • MD5

      eee333c1637253245c3fc51775ba7395

    • SHA1

      bd111eaf7f7687a87de02aa87acdde9d4cd51eb8

    • SHA256

      e5824681466b0a8b36f470252d644bc5a4333d83a8987021df491b471ef8d473

    • SHA512

      c3ad219bacb1c7fc2feb98848bbf61bd559ed9c6ec2ebfb9d4d7380fcd7b34a4f895be7b5f3ac3f588add74bcd8a4cefe6a9b58ad73310e862030ed0f942e087

    • SSDEEP

      3072:efUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIh1Xi6FLPo3cCGCH:efUauY68uSWCx+XA7mg2pNQ1Ljo3cj

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks