MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2548af077d370284e798fd3e071a888c87ea5d8252aebf5a2b38a496a1c476e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OskiStealer


Vendor detections: 11


Maldoc score: 9


Intelligence 11 IOCs 7 YARA File information Comments

SHA256 hash: e2548af077d370284e798fd3e071a888c87ea5d8252aebf5a2b38a496a1c476e
SHA3-384 hash: 172be5076aa452abe2106cd4ccca25ba61495f2eed40811ff4de207437d9f2d1adf7cfafcee69b245f5fee13988ad4a9
SHA1 hash: d30f894e20b6a4c11e1ead24a5bb73f7e1a1ab4c
MD5 hash: 3410fcd691fc5964123aedba7b4bd932
humanhash: december-ten-ten-mississippi
File name:IMG60378611.doc
Download: download sample
Signature OskiStealer
File size:396'800 bytes
First seen:2021-04-28 12:01:24 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 12288:0tOMzOH8ZoFzUOcFvwX9eepPZm4c9Tia:0UMWRFzUwFpPe9Tia
TLSH 11841254B3E8CB53D24721B5CCC2C2DDF221FD62AB45C7873794BB2DA9363984A66348
Reporter abuse_ch
Tags:doc OskiStealer


Avatar
abuse_ch
OskiStealer C2:
http://178.175.148.83/6.jpg

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://178.175.148.83/6.jpg https://threatfox.abuse.ch/ioc/19660/
http://178.175.148.83/1.jpg https://threatfox.abuse.ch/ioc/19661/
http://178.175.148.83/2.jpg https://threatfox.abuse.ch/ioc/19662/
http://178.175.148.83/3.jpg https://threatfox.abuse.ch/ioc/19663/
http://178.175.148.83/4.jpg https://threatfox.abuse.ch/ioc/19664/
http://178.175.148.83/5.jpg https://threatfox.abuse.ch/ioc/19665/
http://178.175.148.83/7.jpg https://threatfox.abuse.ch/ioc/19666/

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 9
Application name is Microsoft Office Word
Office document is in OLE format
Office document contains VBA Macros
OLE dump

MalwareBazaar was able to identify 12 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
46971 bytes1Table
5363461 bytesData
6414 bytesMacros/PROJECT
765 bytesMacros/PROJECTwm
8951 bytesMacros/VBA/Module1
91938 bytesMacros/VBA/ThisDocument
102619 bytesMacros/VBA/_VBA_PROJECT
11562 bytesMacros/VBA/dir
124096 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
SuspiciousCreateObjectMay create an OLE object
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousexecMay run an executable file or a system
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
IMG60378611.doc
Verdict:
Malicious activity
Analysis date:
2021-04-28 12:04:24 UTC
Tags:
macros macros-on-open generated-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Searching for the window
Creating a file
Delayed writing of the file
Creating a file in the %temp% subdirectories
Creating a file in the Windows subdirectories
Modifying a system file
Launching a process by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Payload URLs
URL
File name
Project.Module1.recordseat
1Table
Document image
Document image
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Creates an undocumented autostart registry key
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Downloads files with wrong headers with respect to MIME Content-Type
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Posts data to a JPG file (protocol mismatch)
Powershell drops PE file
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 399161 Sample: IMG60378611.doc Startdate: 28/04/2021 Architecture: WINDOWS Score: 100 60 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->60 62 .NET source code contains potential unpacker 2->62 64 Suspicious powershell command line found 2->64 66 7 other signatures 2->66 10 OUTLOOK.EXE 501 27 2->10         started        13 WINWORD.EXE 37 39 2->13         started        process3 file4 78 Suspicious powershell command line found 10->78 16 powershell.exe 15 18 10->16         started        54 C:\Users\user\AppData\...\IMG60378611.doc.LNK, MS 13->54 dropped signatures5 process6 dnsIp7 56 scaladevelopments.scaladevco.com 35.208.24.64, 49727, 80 GOOGLE-2US United States 16->56 40 C:\Users\Public\...\describemodern.exe, PE32 16->40 dropped 68 Powershell drops PE file 16->68 21 describemodern.exe 6 16->21         started        25 conhost.exe 16->25         started        file8 signatures9 process10 file11 42 C:\Users\user\AppData\Roaming\...\notpad.exe, PE32 21->42 dropped 44 C:\Users\user\AppData\...\describemodern.exe, PE32 21->44 dropped 70 Creates an undocumented autostart registry key 21->70 72 Machine Learning detection for dropped file 21->72 74 Writes to foreign memory regions 21->74 76 Injects a PE file into a foreign processes 21->76 27 describemodern.exe 193 21->27         started        32 describemodern.exe 21->32         started        signatures12 process13 dnsIp14 58 178.175.148.83, 49739, 80 TRABIAMD Moldova Republic of 27->58 46 C:\ProgramData\vcruntime140.dll, PE32 27->46 dropped 48 C:\ProgramData\sqlite3.dll, PE32 27->48 dropped 50 C:\ProgramData\softokn3.dll, PE32 27->50 dropped 52 4 other files (none is malicious) 27->52 dropped 80 Tries to harvest and steal browser information (history, passwords, etc) 27->80 82 Tries to steal Crypto Currency Wallets 27->82 34 cmd.exe 27->34         started        84 Machine Learning detection for dropped file 32->84 file15 signatures16 process17 process18 36 conhost.exe 34->36         started        38 taskkill.exe 34->38         started       
Threat name:
Document-Office.Downloader.EncDoc
Status:
Malicious
First seen:
2021-04-28 12:02:17 UTC
AV detection:
12 of 47 (25.53%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:oski discovery infostealer macro macro_on_action spyware stealer xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Oski
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments