MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 270ac39c0d7cda087e43b6945c1204c6bddeed0d26001f566b4bee9a902ae43c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OskiStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 270ac39c0d7cda087e43b6945c1204c6bddeed0d26001f566b4bee9a902ae43c
SHA3-384 hash: 5ddc605691d6cdf6f79ffc4c94a6c2f9414e11ac7888697fbaab786a4cc4fe418f10b848ad0a57d73610344de374107e
SHA1 hash: ec54b71e40531ad85d9c50f85224cba43e3cd879
MD5 hash: db4bdf07f6006287d9aad227eafa7957
humanhash: speaker-moon-vermont-early
File name:2101222_OrdineFornitore del.ppam
Download: download sample
Signature OskiStealer
File size:12'788 bytes
First seen:2021-09-07 09:54:38 UTC
Last seen:Never
File type:PowerPoint file ppam
MIME type:application/vnd.openxmlformats-officedocument.presentationml.presentation
ssdeep 384:dXPQbARCuyEN43IO0N66+4uW1k5pJnW4D9Xxn:VPQbJsJURvnbD9Xx
TLSH T15042AF2259468023C721AA7DC2AE75EEFE17AC471D14DC2E77119AC05794CC8CADD35E
Reporter abuse_ch
Tags:OskiStealer ppam


Avatar
abuse_ch
OskiStealer payload URL:
http://soitaab.co/wpylfstmyplrexioihplqucxrdiqbnifrp.msi

OskiStealer C2:
http://tunqyuindia.com/mar3//1.jpg

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Legacy PowerPoint File with Macro
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Result
Threat name:
Oski Vidar
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
DLL side loading technique detected
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (process start blacklist hit)
Downloads files with wrong headers with respect to MIME Content-Type
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Obfuscated command line found
Posts data to a JPG file (protocol mismatch)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: msiexec download and execute
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Oski Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 478906 Sample: 2101222_OrdineFornitore del.ppam Startdate: 07/09/2021 Architecture: WINDOWS Score: 100 67 tunqyuindia.com 2->67 69 soitaab.co 2->69 77 Found malware configuration 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 Yara detected Oski Stealer 2->81 83 12 other signatures 2->83 9 MSIF20A.tmp 1 23 2->9         started        14 POWERPNT.EXE 501 25 2->14         started        16 Wpylfst.exe 2 13 2->16         started        18 Wpylfst.exe 2->18         started        signatures3 process4 dnsIp5 73 cdn.discordapp.com 162.159.133.233, 443, 49717, 49718 CLOUDFLARENETUS United States 9->73 63 C:\Users\Public\Libraries\...\Wpylfst.exe, PE32 9->63 dropped 89 Detected unpacking (changes PE section rights) 9->89 91 Injects a PE file into a foreign processes 9->91 20 MSIF20A.tmp 196 9->20         started        25 cmd.exe 1 9->25         started        27 cmd.exe 1 9->27         started        65 C:\...\~$2101222_OrdineFornitore del.ppam, data 14->65 dropped 93 Obfuscated command line found 14->93 29 cmd.exe 1 14->29         started        75 162.159.130.233, 443, 49722 CLOUDFLARENETUS United States 16->75 file6 signatures7 process8 dnsIp9 71 tunqyuindia.com 185.212.128.145, 49721, 49723, 80 INTERNET-ITNL Germany 20->71 55 C:\ProgramData\sqlite3.dll, PE32 20->55 dropped 57 C:\ProgramData\vcruntime140.dll, PE32 20->57 dropped 59 C:\ProgramData\softokn3.dll, PE32 20->59 dropped 61 4 other files (none is malicious) 20->61 dropped 85 Tries to harvest and steal browser information (history, passwords, etc) 20->85 87 DLL side loading technique detected 20->87 31 cmd.exe 1 20->31         started        33 reg.exe 1 25->33         started        35 conhost.exe 25->35         started        37 cmd.exe 1 27->37         started        39 conhost.exe 27->39         started        41 conhost.exe 29->41         started        43 msiexec.exe 29->43         started        45 timeout.exe 1 29->45         started        file10 signatures11 process12 process13 47 taskkill.exe 1 31->47         started        49 conhost.exe 31->49         started        51 conhost.exe 33->51         started        53 conhost.exe 37->53         started       
Threat name:
Document-Word.Trojan.Heuristic
Status:
Malicious
First seen:
2021-09-07 07:28:49 UTC
AV detection:
13 of 43 (30.23%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:oski discovery infostealer persistence spyware stealer suricata
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies registry key
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Loads dropped DLL
Reads user/profile data of web browsers
Use of msiexec (install) with remote resource
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Oski
Process spawned unexpected child process
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
tunqyuindia.com/mar3/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Embedded_PE

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments