General

  • Target

    753f316cffd68bd3c5161c8387a770b4_JaffaCakes118

  • Size

    694KB

  • Sample

    240726-w99ebaxbml

  • MD5

    753f316cffd68bd3c5161c8387a770b4

  • SHA1

    96a99cc3f60aaa86fd951eecdc22d0b6117ccbfa

  • SHA256

    1ef805d037a3e6d5667c5f09316d85231d217c452c0759fd16ccd34f75e3c22c

  • SHA512

    21f3c2ca3f150d0dd51803707b9d0052ec6e2628cd5379f4d632c54ab2b2800a3b390802af097db6e19dc1b0dae279994a2a245c7cc95bfa45b2e8150473af02

  • SSDEEP

    12288:FleNG/r9AP+CpkUoZUpgzMtv/ZAgEXF2/cpurmcYv2tasGHW:+k/ntRKpgotv/6Xl8AutasoW

Malware Config

Extracted

Family

oski

C2

hanxlas.ac.ug

Targets

    • Target

      753f316cffd68bd3c5161c8387a770b4_JaffaCakes118

    • Size

      694KB

    • MD5

      753f316cffd68bd3c5161c8387a770b4

    • SHA1

      96a99cc3f60aaa86fd951eecdc22d0b6117ccbfa

    • SHA256

      1ef805d037a3e6d5667c5f09316d85231d217c452c0759fd16ccd34f75e3c22c

    • SHA512

      21f3c2ca3f150d0dd51803707b9d0052ec6e2628cd5379f4d632c54ab2b2800a3b390802af097db6e19dc1b0dae279994a2a245c7cc95bfa45b2e8150473af02

    • SSDEEP

      12288:FleNG/r9AP+CpkUoZUpgzMtv/ZAgEXF2/cpurmcYv2tasGHW:+k/ntRKpgotv/6Xl8AutasoW

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks