Meet Oski Stealer: An In-depth Analysis of the Popular Credential Stealer
The “customers,” also known as the attackers, contact Oski authors on underground forums to purchase the malware and, once purchased, they configure it and distribute it to their victims.