To provide a more detailed technical report, I would need to know:
Do you have the of the file for a more precise lookup? Caution: Phishing e-mails in the name of the OASI
: To trick victims into providing personal data and credit card information, which is then used for fraudulent purchases or sold to third parties. Technical Context
Based on available intelligence, this file is likely associated with the following activity:
: Check official warnings from the Swiss National Cyber Security Centre (NCSC) regarding OASI-themed scams.
: Archives with names like luciferzip often contain obfuscated scripts (VBA macros) or executables designed to bypass basic filters.
Analysis of similar threats labeled under "OASI" or "Oasis" in automated sandboxes suggests the following technical traits: : Primarily Phishing and Credential Harvesting .
: Some associated executable files attempt to reach out to remote command-and-control (C2) servers or download secondary malware like Lucifer (a combined cryptojacker and DDoS bot). Protective Measures If you have encountered this file:
To provide a more detailed technical report, I would need to know:
Do you have the of the file for a more precise lookup? Caution: Phishing e-mails in the name of the OASI
: To trick victims into providing personal data and credit card information, which is then used for fraudulent purchases or sold to third parties. Technical Context oasi_newfull_luciferzip
Based on available intelligence, this file is likely associated with the following activity:
: Check official warnings from the Swiss National Cyber Security Centre (NCSC) regarding OASI-themed scams. To provide a more detailed technical report, I
: Archives with names like luciferzip often contain obfuscated scripts (VBA macros) or executables designed to bypass basic filters.
Analysis of similar threats labeled under "OASI" or "Oasis" in automated sandboxes suggests the following technical traits: : Primarily Phishing and Credential Harvesting . : Archives with names like luciferzip often contain
: Some associated executable files attempt to reach out to remote command-and-control (C2) servers or download secondary malware like Lucifer (a combined cryptojacker and DDoS bot). Protective Measures If you have encountered this file:
Archive|Mobile|Dark room|Smart Profix
2026-03-09 01:25 GMT+2 , Processed in 0.058023 sec., 12 queries .
Powered by Discuz! X3.4 Release 20230520
👋 Hello! How can we assist you today?