Overview
overview
10Static
static
10Ozz Steale...I2.dll
windows7-x64
1Ozz Steale...I2.dll
windows10-2004-x64
1Ozz Steale...on.dll
windows7-x64
1Ozz Steale...on.dll
windows10-2004-x64
1Ozz Steale...er.exe
windows7-x64
1Ozz Steale...er.exe
windows10-2004-x64
1Ozz Steale...er.exe
windows7-x64
1Ozz Steale...er.exe
windows10-2004-x64
7Ozz Steale...nt.dll
windows7-x64
1Ozz Steale...nt.dll
windows10-2004-x64
1Ozz Steale...on.bat
windows7-x64
1Ozz Steale...on.bat
windows10-2004-x64
8Ozz Steale...ll.bat
windows7-x64
1Ozz Steale...ll.bat
windows10-2004-x64
1Ozz Steale...nt.dll
windows7-x64
1Ozz Steale...nt.dll
windows10-2004-x64
1General
-
Target
Ozz Stealer.zip
-
Size
2.3MB
-
Sample
240917-rs1nmayamj
-
MD5
e8f8fe3eca656cdb02dccb6f8fbbf48d
-
SHA1
54e5d2d06fc6e2a4a31911de563faf091c68f81c
-
SHA256
a7cac9691778468185b7d6ec1735f4a1f07de8eccb946e8d4d2224d8a6bab4d5
-
SHA512
2409d7ad230135ac8bf3f4cda24da75f6a86f9966f0c5767b1e4149e6f295c7d3b4480254d050dc26b97e381cab088b426a7d53ba6673b3277a2cfd36c4f2ed9
-
SSDEEP
24576:WKgt9v8Rt2G+SuZ/Ym1Gj2uhl9jzcY0XW9x7Ow0TjFXNR0+A80vIqrdhe6cAkc/o:Hgrm/uVdo9jzv71OZtNWRQCAIki0mnDy
Behavioral task
behavioral1
Sample
Ozz Stealer/Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Ozz Stealer/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Ozz Stealer/Newtonsoft.Json.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Ozz Stealer/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Ozz Stealer/Ozz_Stealer.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Ozz Stealer/Ozz_Stealer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Ozz Stealer/Ozz_Stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ozz Stealer/Ozz_Stealer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Ozz Stealer/System.Management.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Ozz Stealer/System.Management.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Ozz Stealer/install-python.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ozz Stealer/install-python.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Ozz Stealer/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ozz Stealer/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Ozz Stealer/runtimes/win/lib/net7.0/System.Management.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Ozz Stealer/runtimes/win/lib/net7.0/System.Management.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Ozz Stealer/Guna.UI2.dll
-
Size
2.1MB
-
MD5
b429ae86c5be521bc8ca3b164cec3acb
-
SHA1
387560073ff5a1f2191abc6f75fc34532bbb6dd2
-
SHA256
3ac70532408b89159bfe235d4ed228faa03ae3fbd63ec6a82d895f287a3b0579
-
SHA512
eae65de53da50708983ed8ebf9e1e3dd5f9aea95a354d272e199bb59517f62bfe35f0df7a37d81ab0423d0d6d29304fa70284c731bd54023e446b2c19bacafb1
-
SSDEEP
24576:DgWuftU4WrNOA6sM6kXxMfNmnjk/c5NrH0UUoo2QkJXVSItH5ppoO0KzJ6nFwHQL:DA+NOpXm1mnj0cP+DkhMAiawnFV
Score1/10 -
-
-
Target
Ozz Stealer/Newtonsoft.Json.dll
-
Size
695KB
-
MD5
adf3e3eecde20b7c9661e9c47106a14a
-
SHA1
f3130f7fd4b414b5aec04eb87ed800eb84dd2154
-
SHA256
22c649f75fce5be7c7ccda8880473b634ef69ecf33f5d1ab8ad892caf47d5a07
-
SHA512
6a644bfd4544950ed2d39190393b716c8314f551488380ec8bd35b5062aa143342dfd145e92e3b6b81e80285cac108d201b6bbd160cb768dc002c49f4c603c0b
-
SSDEEP
12288:mFIM0KteTMN4Or4D3OdmZg5WHEaEDIGBBjgrIQtD+tVqDMW:6zMTMNNd+g5Wk78GBBjgrIQtDF
Score1/10 -
-
-
Target
Ozz Stealer/Ozz_Stealer.dll
-
Size
1.2MB
-
MD5
88d3f81e9c17733351e0aab6ac8e9049
-
SHA1
1827234973a3c48bbb5dc5673aedf5df2baef578
-
SHA256
aaaa33bd2e23527ba44f099b31cf4a27bb4617f5a07f871d658bcbf35e43acf0
-
SHA512
7c8f2ec495a5c6016bf035e0d3c02b4d26afd76412421921a1c1ff9e0077d88d27d13dbd4bf54cf47523ba3cd2e548d46e6c771584c313fa82afaa301a327f6a
-
SSDEEP
24576:oOFEqOFEqOFEjg3o9R3kztDewxTNE2HZYdT2RbJS:Byy4n9RaDdxJDZYdyRbJS
Score1/10 -
-
-
Target
Ozz Stealer/Ozz_Stealer.exe
-
Size
160KB
-
MD5
aa65c1f4a77cea6d9e13f47656d3bf18
-
SHA1
2c02fb3f735c192c792fd89dc90bdb9ace35214c
-
SHA256
a6716765985978a0358a1bcb931236eb23ccb3427c8ba336aa5457a90f3492da
-
SHA512
0938deaba77720b85a8acbde72d7d4e832aafd3391db0effbb458c52a501e123f47ae31b1ffcf7b5532506704876d6338844c66130966acb47c0924e77793f9e
-
SSDEEP
3072:qiS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJq8ltgSbuUb:qiS4ompB9S3BZi0a1G78IVhccctG
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
Ozz Stealer/System.Management.dll
-
Size
72KB
-
MD5
1c71e5310151ce1e9a3a92797776bdad
-
SHA1
fd452b874fec4a9dae61a3710fb32749dc7d701e
-
SHA256
f515ca5c944c332ab706ff0a7c2e53e66d0d9d8a663e9b2691b35129ee22559b
-
SHA512
2a4f18c77449c2d06a3ab6807338f73b03b1faa332e78319829ba3a2b6fd98bb9a83c5e29b47d55e4ce7f0dfdcd8524fa592a0f3ca8ee09daae2894b681265a8
-
SSDEEP
768:BrEP45HksbMU3se5c/0b/9nLZV1BCUkVoV0lP7H0CkkiSLJKdbY8Mtuo0eDQP9zu:bbz5wulNV1zkSQzHxkxS9yc8no0nzu
Score1/10 -
-
-
Target
Ozz Stealer/install-python.bat
-
Size
683B
-
MD5
d2582c98db5aad03be0d391a265f861b
-
SHA1
bb545f83d8d69c8a1a08cd773ddcb53689e8f57c
-
SHA256
44d62021bd4fa1870a45fc9f1b9bb978196987452688060a87ee97e4626fa4af
-
SHA512
268a5a71c70081ee8d6aa34d0a9158740712e174a70a0fac2972bd8fa812c34107ba2859d2f31391cc4b27f3f81a986160d9feb14880bdf02fe0c43567b2afbe
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Ozz Stealer/install.bat
-
Size
38B
-
MD5
667537a1c25c3050eba77c74a343329f
-
SHA1
794df2143bd7bd07f9ade899d8fb1055b93236ea
-
SHA256
60e27d880d37915497117cecaf8919b5330ff908880451e937d4a83a8f563375
-
SHA512
19ec6064e8ed3ecf531bb8f051b88314c12e55dafd1380830acdf3496c3f863f8ba4dbb14a898cc4d2523846dfba5b021d4716b55781830be7fcf0bbae3dd011
Score1/10 -
-
-
Target
Ozz Stealer/runtimes/win/lib/net7.0/System.Management.dll
-
Size
288KB
-
MD5
76e0aaa7182e77403bf6fe2af8d90f28
-
SHA1
d013c5d649f9ebce5bee1c8b774f3290b1f1f532
-
SHA256
a7e248c3e6f25f4673e2006fa77f4a4322a3c74c2652dcc395178329feb7ff28
-
SHA512
8e161a375fe174d9b203c2a098c92aff411d8521eef133d5174ae7409c394157f7a067c2a9dfe3f76cb02acbed52c33a11579b9a1cbee75e4092e6487d1a7bc1
-
SSDEEP
6144:TMbKUVLmD7HP9ab+T5sBFzPnQpEZFAc2Q:45VL2Z++tw92Q
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1