MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c660c3550f98a7c592a5d3d0487c3dbbac45bb031310f4d2c9b667dbf8fd2f05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OskiStealer


Vendor detections: 8


Intelligence 8 IOCs 7 YARA 1 File information Comments

SHA256 hash: c660c3550f98a7c592a5d3d0487c3dbbac45bb031310f4d2c9b667dbf8fd2f05
SHA3-384 hash: 3e0be46685293bdd388257828df7f57b21ae9fe264ef0a0de6fe76a8d3c251e88b2f1caf4387b74c422e3d41bdb250cd
SHA1 hash: bce5260517408a193f19e946d3eebd2657732b99
MD5 hash: af2213e7d1889e354fc3c6e5b22f2f14
humanhash: sierra-massachusetts-lactose-vermont
File name:ORDER 33212762.ppam
Download: download sample
Signature OskiStealer
File size:12'892 bytes
First seen:2021-09-07 08:47:07 UTC
Last seen:Never
File type:PowerPoint file ppam
MIME type:application/vnd.openxmlformats-officedocument.presentationml.presentation
ssdeep 192:xrXP/GV8JhXckmtI1c8ZI1CSYDYEtRTFMYjaMmcIvRdSGoC/:dXPgnkmtIa821CTFtnPOcI3SGoA
TLSH T18142AF1BA5CFA181CB4E853DE24808F634262CECFC49DD46E0EBD6856BF4C53721628A
Reporter abuse_ch
Tags:OskiStealer ppam


Avatar
abuse_ch
OskiStealer C2:
http://elsantos.co/sa//7.jpg

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://elsantos.co/sa//7.jpg https://threatfox.abuse.ch/ioc/216925/
http://elsantos.co/sa//6.jpg https://threatfox.abuse.ch/ioc/216926/
http://elsantos.co/sa//1.jpg https://threatfox.abuse.ch/ioc/216927/
http://elsantos.co/sa//2.jpg https://threatfox.abuse.ch/ioc/216928/
http://elsantos.co/sa//3.jpg https://threatfox.abuse.ch/ioc/216929/
http://elsantos.co/sa//4.jpg https://threatfox.abuse.ch/ioc/216930/
http://elsantos.co/sa//5.jpg https://threatfox.abuse.ch/ioc/216931/

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Legacy PowerPoint File with Macro
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Result
Threat name:
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
DLL side loading technique detected
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (process start blacklist hit)
Downloads files with wrong headers with respect to MIME Content-Type
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Obfuscated command line found
Posts data to a JPG file (protocol mismatch)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: msiexec download and execute
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Oski Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 478846 Sample: ORDER 33212762.ppam Startdate: 07/09/2021 Architecture: WINDOWS Score: 100 67 soitaab.co 2->67 69 elsantos.co 2->69 79 Found malware configuration 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 Yara detected Oski Stealer 2->83 85 11 other signatures 2->85 9 MSI9AFC.tmp 1 22 2->9         started        14 POWERPNT.EXE 501 22 2->14         started        16 Dtsihzg.exe 13 2->16         started        18 Dtsihzg.exe 3 13 2->18         started        signatures3 process4 dnsIp5 73 cdn.discordapp.com 162.159.135.233, 443, 49729, 49730 CLOUDFLARENETUS United States 9->73 75 192.168.2.1 unknown unknown 9->75 63 C:\Users\Public\Libraries\...\Dtsihzg.exe, PE32 9->63 dropped 91 Detected unpacking (changes PE section rights) 9->91 93 Injects a PE file into a foreign processes 9->93 20 MSI9AFC.tmp 196 9->20         started        25 cmd.exe 1 9->25         started        27 cmd.exe 1 9->27         started        65 C:\Users\user\Desktop\~$ORDER 33212762.ppam, data 14->65 dropped 95 Obfuscated command line found 14->95 29 cmd.exe 1 14->29         started        77 162.159.134.233, 443, 49733, 49735 CLOUDFLARENETUS United States 16->77 file6 signatures7 process8 dnsIp9 71 elsantos.co 185.212.129.56, 49734, 49736, 49737 INTERNET-ITNL Germany 20->71 55 C:\ProgramData\sqlite3.dll, PE32 20->55 dropped 57 C:\ProgramData\vcruntime140.dll, PE32 20->57 dropped 59 C:\ProgramData\softokn3.dll, PE32 20->59 dropped 61 4 other files (none is malicious) 20->61 dropped 87 Tries to harvest and steal browser information (history, passwords, etc) 20->87 89 DLL side loading technique detected 20->89 31 cmd.exe 1 20->31         started        33 reg.exe 1 25->33         started        35 conhost.exe 25->35         started        37 cmd.exe 1 27->37         started        39 conhost.exe 27->39         started        41 conhost.exe 29->41         started        43 msiexec.exe 29->43         started        45 timeout.exe 1 29->45         started        file10 signatures11 process12 process13 47 taskkill.exe 1 31->47         started        49 conhost.exe 31->49         started        51 conhost.exe 33->51         started        53 conhost.exe 37->53         started       
Threat name:
Document-Word.Trojan.Heuristic
Status:
Malicious
First seen:
2021-09-07 08:48:07 UTC
AV detection:
8 of 35 (22.86%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:oski discovery infostealer persistence spyware stealer suricata
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies registry key
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Loads dropped DLL
Reads user/profile data of web browsers
Use of msiexec (install) with remote resource
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Oski
Process spawned unexpected child process
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
elsantos.co/sa/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Embedded_PE

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments