General

  • Target

    http://209.141.40.190/oracleservice.exe

  • Sample

    211005-xpq8nsacc4

Score
8/10

Malware Config

Targets

    • Target

      http://209.141.40.190/oracleservice.exe

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks