Rewterz Threat Alert – Cobalt Strike Malware – Active IOCs
April 7, 2022Rewterz Threat Alert – Vovabol Ransomware – Active IOCs
April 7, 2022Rewterz Threat Alert – Cobalt Strike Malware – Active IOCs
April 7, 2022Rewterz Threat Alert – Vovabol Ransomware – Active IOCs
April 7, 2022Severity
High
Analysis Summary
An emergent and effective data-harvesting tool dubbed Oski is proliferating in North America and China, stealing online account credentials, credit card numbers, crypto wallet accounts, and more. The malware is still in its developing phase but packs a punch with its capabilities. Oski C2’s dashboard revealed that Oski’s theft tactics involve extracting credentials using man-in-the-browser (MitB) attacks by hooking the browser processes using DLL injection, It also extracts credentials from the registry, passwords from the browser SQLite database, and stored session cookies of all stripes, including crypto-wallet cookies from Bitcoin Core, Ethereum, Monero, Litecoin, and others.
Impact
- Credential Theft
- Unauthorized Access
Indicators of Compromise
Filename
- Build[.]exe
MD5
- 880924e5583978c615dd03ff89648093
SHA-256
- 4bcff4386ce8fadce358ef0dbe90f8d5aa7b4c7aec93fca2e605ca2cbc52218b
SHA-1
- ef759f6eca63d6b05a7b6e395df3571c9703278b
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.
- Search for IOCs in your environment.