Rewterz Threat Alert – LokiBot Malware – Active IOCs
December 23, 2021Rewterz Threat Alert – Kimsuky APT Group – Active IOCs
December 23, 2021Rewterz Threat Alert – LokiBot Malware – Active IOCs
December 23, 2021Rewterz Threat Alert – Kimsuky APT Group – Active IOCs
December 23, 2021Severity
High
Analysis Summary
An emergent and effective data-harvesting tool dubbed Oski is proliferating in North America and China, stealing online account credentials, credit card numbers, crypto wallet accounts, and more. The malware is still in its developing phase but packs a punch with its capabilities. Oski C2’s dashboard revealed that Oski’s theft tactics involve extracting credentials using man-in-the-browser (MitB) attacks by hooking the browser processes using DLL injection, It also extracts credentials from the registry, passwords from the browser SQLite database, and stored session cookies of all stripes, including crypto-wallet cookies from Bitcoin Core, Ethereum, Monero, Litecoin, and others.
Impact
- Credential Theft
- Unauthorized Access
Indicators of Compromise
MD5
- c139bfdbe8ede9fc87dff8ea7ed5ca83
- a4e54d43129a017b9e1b36ab2e979134
SHA-256
- 2483e3d38f1856bf14e1bd86692e4ac5b3f330a52166d7708fba883a6809595b
- 7b9e493205a6655c10fbd597de3bcea1e0d628b50831a69c723b7dbe30410633
SHA-1
- f9af55ddd2b0949b4a78f79d95e488d92ec0929c
- f31d2e144042a33974866a90d325e242d6af53bd
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.
- Search for IOCs in your environment.