Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. OopsIE

OopsIE

OopsIE is a Trojan used byOilRig to remotely execute commands as well as upload/download files to/from victims.[1]

ID: S0264
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 17 October 2018
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

OopsIE uses HTTP for C2 communications.[1][2]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

OopsIE compresses collected files with GZipStream before sending them to its C2 server.[1]

.003Archive Collected Data:Archive via Custom Method

OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

OopsIE uses the command prompt to execute commands on the victim's machine.[1][2]

.005Command and Scripting Interpreter:Visual Basic

OopsIE creates and uses a VBScript as part of its persistent execution.[1][2]

EnterpriseT1132.001Data Encoding:Standard Encoding

OopsIE encodes data in hexadecimal format over the C2 channel.[1]

EnterpriseT1074.001Data Staged:Local Data Staging

OopsIE stages the output from command execution and collected files in specific folders before exfiltration.[1]

EnterpriseT1030Data Transfer Size Limits

OopsIE exfiltrates command output and collected files to its C2 server in 1500-byte blocks.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.[1]

EnterpriseT1041Exfiltration Over C2 Channel

OopsIE can upload files from the victim's machine to its C2 server.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

OopsIE has the capability to delete files and scripts from the victim's machine.[2]

EnterpriseT1105Ingress Tool Transfer

OopsIE can download files from its C2 server to the victim's machine.[1][2]

EnterpriseT1027Obfuscated Files or Information

OopsIE uses the Confuser protector to obfuscate an embedded .Net Framework assembly used for C2.OopsIE also encodes collected data in hexadecimal format before writing to files on disk and obfuscates strings.[1][2]

.002Software Packing

OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

OopsIE creates a scheduled task to run itself every three minutes.[1][2]

EnterpriseT1082System Information Discovery

OopsIE checks for information on the CPU fan, temperature, mouse, hard disk, and motherboard as part of its anti-VM checks.[2]

EnterpriseT1124System Time Discovery

OopsIE checks to see if the system is configured with "Daylight" time and checks for a specific region to be set for the timezone.[2]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI querySELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if it’s running in a virtual environment.[2]

EnterpriseT1047Windows Management Instrumentation

OopsIE uses WMI to perform discovery techniques.[2]

Groups That Use This Software

IDNameReferences
G0049OilRig

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp