General

  • Target

    JaffaCakes118_d94afd09f7fd6acfab19c11d63d47cc0

  • Size

    248KB

  • Sample

    250110-dmk44aslfp

  • MD5

    d94afd09f7fd6acfab19c11d63d47cc0

  • SHA1

    90ec971ee903cda86f25c43d655bcf2af16c822a

  • SHA256

    d985cb2261727cddb2db12eaea8ece3fea24d199622cc30d317a6aeacd50d930

  • SHA512

    b95c749740f41e1bccbda65ce95d728feaf3a7288f25b4b3f861a28d76331ecca25095ce548b6a6f631f298cc92c14bc6d296ca18849a497dbf0ef5ccfc25599

  • SSDEEP

    6144:s7AFPOns551dxzAUdYKHWqLHWm00RLqp0axjCN:saj51ddxdq6NM2axmN

Malware Config

Extracted

Family

oski

C2

scarsa.ac.ug

Targets

    • Target

      JaffaCakes118_d94afd09f7fd6acfab19c11d63d47cc0

    • Size

      248KB

    • MD5

      d94afd09f7fd6acfab19c11d63d47cc0

    • SHA1

      90ec971ee903cda86f25c43d655bcf2af16c822a

    • SHA256

      d985cb2261727cddb2db12eaea8ece3fea24d199622cc30d317a6aeacd50d930

    • SHA512

      b95c749740f41e1bccbda65ce95d728feaf3a7288f25b4b3f861a28d76331ecca25095ce548b6a6f631f298cc92c14bc6d296ca18849a497dbf0ef5ccfc25599

    • SSDEEP

      6144:s7AFPOns551dxzAUdYKHWqLHWm00RLqp0axjCN:saj51ddxdq6NM2axmN

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Oski family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks