Static task
static1
Behavioral task
behavioral1
Sample
98cf24d2820d87e587ce0073fb303066192dede2b2a3b319f9d15d7949a25eab.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
98cf24d2820d87e587ce0073fb303066192dede2b2a3b319f9d15d7949a25eab.exe
Resource
win10v20210410
General
-
Target
98cf24d2820d87e587ce0073fb303066192dede2b2a3b319f9d15d7949a25eab
-
Size
1.3MB
-
MD5
fb71ff3ffdd50950d58e5d74f0cb4d36
-
SHA1
fd0882a725e4ade9b3d5a75a0f1cde65cfb16961
-
SHA256
98cf24d2820d87e587ce0073fb303066192dede2b2a3b319f9d15d7949a25eab
-
SHA512
fc594764ffc45d83907c2aaefb76290803f16c341501784e3d716825d613ec95e469da44954b1beac47d8c1d3ffc6f1bff8cbf21b3766a942a29c1611b44dfbf
Malware Config
Extracted
orcus
178.5.71.180:80
a4d505b115fc4401a4572b6a21933126
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\HD Audio\HD Audio.exe
-
reconnect_delay
10000
-
registry_keyname
Hd Audio
-
taskscheduler_taskname
Hd audio
-
watchdog_path
AppData\Yourphone.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule sample orcus -
Orcus Main Payload 1 IoCs
Processes:
resource yara_rule sample family_orcus -
Orcus family
Files
-
98cf24d2820d87e587ce0073fb303066192dede2b2a3b319f9d15d7949a25eab.exe windows x86