MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a29e53d24618766608672bb9d74821104738c939bee4f6baf2b36151b0d1dc07. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
OskiStealer
Vendor detections: 9
| SHA256 hash: | a29e53d24618766608672bb9d74821104738c939bee4f6baf2b36151b0d1dc07 |
|---|---|
| SHA3-384 hash: | af3ffda9036a186cb2f65e8f2ce63885c5ce233e42a32383b436fbd9c41fa6b9963dd40f59ab24a43f88771161fa5356 |
| SHA1 hash: | 6a3a97f3caed0fe034b25c3741d0b3e47eac5b5a |
| MD5 hash: | db39dd22ddb272a1022ce1c5dd933617 |
| humanhash: | whiskey-georgia-network-snake |
| File name: | Waybill Document 22700456XX,pdf.exe |
| Download: | download sample |
| Signature | OskiStealer |
| File size: | 903'680 bytes |
| First seen: | 2021-05-20 15:04:55 UTC |
| Last seen: | 2021-05-20 21:22:15 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3e8a518ae58159a44bd8bc83008aa8aa (1 x OskiStealer, 1 x Loki, 1 x RemcosRAT) |
| ssdeep | 12288:9S80SbYOAD65QF6ofEwawyWCqGjUwudw1239PadHiomSD1zmEyCiomjNs:93VbRAQQF78waJqqtGoOAHaCCs |
| Threatray | 1'472 similar samples on MalwareBazaar |
| TLSH | 7C15AE22B2414436C17A1E389C1B66B69E35BF31AD18946B37F53D0CBF356A13E292C7 |
| Reporter | |
| Tags: | OskiStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Waybill Document 22700456XX,pdf.cab
Verdict:
Malicious activity
Analysis date:
2021-05-20 13:21:52 UTC
Tags:
trojan stealer vidar loader evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Vidar
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a file
Deleting a recently created file
Reading critical registry keys
Replacing files
Delayed writing of the file
Sending an HTTP GET request
Changing the Zone.Identifier stream
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Running batch commands
Using the Windows Management Instrumentation requests
Searching for the window
Unauthorized injection to a recently created process
Stealing user critical data
Launching a tool to kill processes
Unauthorized injection to a recently created process by context flags manipulation
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-05-20 15:05:13 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 1'462 additional samples on MalwareBazaar
Result
Malware family:
snakekeylogger
Score:
10/10
Tags:
family:oski family:snakekeylogger discovery infostealer keylogger spyware stealer
Behaviour
Checks processor information in registry
Kills process with taskkill
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Oski
Snake Keylogger
Snake Keylogger Payload
Malware Config
C2 Extraction:
45.133.1.223
https://api.telegram.org/bot1761516426:AAE3Juu_v6fG9Gy1S33LdTvyz85ua-duZsk/sendMessage?chat_id=1727399585
https://api.telegram.org/bot1761516426:AAE3Juu_v6fG9Gy1S33LdTvyz85ua-duZsk/sendMessage?chat_id=1727399585
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.