Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 16:41
Behavioral task
behavioral1
Sample
2024-12-25_d4033589956157929738ba378a9f50fb_karagany_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-25_d4033589956157929738ba378a9f50fb_karagany_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-25_d4033589956157929738ba378a9f50fb_karagany_mafia.exe
-
Size
200KB
-
MD5
d4033589956157929738ba378a9f50fb
-
SHA1
e85775f7e2faffc66a468f677efaed5006728ff1
-
SHA256
60ab432b7935cea8af65b4d148e305f0650d89415274dba163489af6cd2ce38e
-
SHA512
ca90b1bea7bce32e538fafbefed704cbb823e8e7a5dd93afcaa53f9ea0618a0873e73bf35883ea3ce0bc6a3ed898b622e784ddcbe4b6acd66b4c679e32d22a75
-
SSDEEP
3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIS1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pNH1Ljo3c
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Oski family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4624 1628 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-25_d4033589956157929738ba378a9f50fb_karagany_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-25_d4033589956157929738ba378a9f50fb_karagany_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-25_d4033589956157929738ba378a9f50fb_karagany_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 13562⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1628 -ip 16281⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196B
MD562962daa1b19bbcc2db10b7bfd531ea6
SHA1d64bae91091eda6a7532ebec06aa70893b79e1f8
SHA25680c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880
SHA5129002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7