// CyberDefenders  ·  Threat Intelligence

Oski Lab — Stealc Malware Sandbox Analysis

CyberDefenders Easy VirusTotal ANY.RUN
Initial Access Execution Defense Evasion Credential Access Command And Control Exfiltration

Oski Lab – Stealc Malware Sandbox Analysis

Overview

The accountant at the company received an email titled “Urgent New Order” from a client late in the afternoon. When he attempted to access the attached invoice, he discovered it contained false order information. Subsequently, the SIEM solution generated an alert regarding downloading a potentially malicious file. Upon initial investigation, it was found that the PPT file might be responsible for this download.

Category: Threat Intelligence
Tools Used: VirusTotal, Any.Run

… MD5 Hash:

12c1842c3ccafe7408c23ebf292ee3d9

proof_oski.png

Category:

Threat Intel

Tactics:

Initial AccessExecutionDefense EvasionCredential AccessCommand and ControlExfiltration

Tools:

VirusTotalANY.RUN

Initial Threat Intelligence

The provided MD5 hash was analysed using VirusTotal.

Results:

This immediately confirms high-confidence malicious classification. virus_total_detection.png

File Timeline

From the Details tab in VirusTotal:

Creation timestamps can provide insight into malware development lifecycle and campaign age. creation_time.png

q1.png

Command & Control Infrastructure

From the Relations tab in VirusTotal:

C2 Server:

http://171.22.28.221/5c06c05b7b34e8e6.php

This URL indicates:

Tracking C2 infrastructure is critical for:


contacted_urls.png

q2.png

Dropped Files

From sandbox analysis:

The malware drops:

sqlite3.dll

This suggests interaction with local browser data stores, aligning with Stealc’s credential harvesting behaviour. dropped_files.png q3.png

Encryption Key (RC4)

From the Any.Run sandbox report:

RC4 Key:

5329514621441247975720749009

This key is used to decrypt base64-encoded strings within the malware configuration.

Extracting encryption keys allows analysts to:

q4.png

MITRE ATT&CK Mapping

From the Any.Run behavioural mapping:

The primary technique observed:

T1555 – Credentials from Password Stores

This confirms Stealc’s core objective: browser credential theft. mitret1555.png

q5.png

Defense Evasion & Self-Deletion

Sandbox behaviour shows:

q6.png

This behaviour aligns with:

Self-deletion reduces artifact persistence on infected hosts. timeout.png

q7.png

Attack Chain Summary

  1. User opens malicious PPT attachment.

  2. Malware executes and establishes C2 communication.

  3. Stealc extracts browser credentials.

  4. RC4 encryption used for configuration protection.

  5. Dropped DLL interacts with credential stores.

  6. Malware deletes itself after 5 seconds to evade detection.


Detection & Defensive Considerations


Lessons Learned


This lab was particularly enjoyable because it mirrors realistic SOC triage:

It reinforces the value of structured threat intelligence workflows in day-one SOC operations.

I successfully completed Oski Blue Team Lab at @CyberDefenders! https://cyberdefenders.org/blueteam-ctf-challenges/achievements/inksec/oski/

#CyberDefenders #CyberSecurity #BlueYard #BlueTeam #InfoSec #SOC #SOCAnalyst #DFIR #CCD #CyberDefender