General

  • Target

    73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118

  • Size

    494KB

  • Sample

    240726-mt8neasgrj

  • MD5

    73b8f1ec16231a14550fc51007ad07d3

  • SHA1

    63f959b1df1e38137b14f5f14cb216b8c96dbd84

  • SHA256

    5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487

  • SHA512

    b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b

  • SSDEEP

    12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm

Malware Config

Extracted

Family

oski

C2

no1geekfun.com/surce/a/

Targets

    • Target

      73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118

    • Size

      494KB

    • MD5

      73b8f1ec16231a14550fc51007ad07d3

    • SHA1

      63f959b1df1e38137b14f5f14cb216b8c96dbd84

    • SHA256

      5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487

    • SHA512

      b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b

    • SSDEEP

      12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks