General

  • Target

    52EE41A4329C6874DF19851AC928C8E8.exe

  • Size

    899KB

  • Sample

    210712-c9zwaz3llj

  • MD5

    52ee41a4329c6874df19851ac928c8e8

  • SHA1

    ba47b57ff5b0c6d02ea5a1b80e96cee5387b03de

  • SHA256

    e7e7d51e82941b9eb56f82854e9682dc7a8593185ce6216082d5f795ceace582

  • SHA512

    6f640819de2f407337578e047df76aadc23f2062c0a798a47a05bd6407b924f286f71cb4ef1c00b568223ac8e5c05afa39261cdcf86e8e913ff0e23096c201ac

Malware Config

Extracted

Family

orcus

C2

orcustop4ik.duckdns.org:6666

Mutex

9280ed1ca561486e8b0282e7c4fcd77c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %appdata%\Windows Defender\UnzipManager.exe

  • reconnect_delay

    10000

  • registry_keyname

    Unzipper

  • taskscheduler_taskname

    Unzipper

  • watchdog_path

    AppData\WindowsServer\svhost.exe

Targets

    • Target

      52EE41A4329C6874DF19851AC928C8E8.exe

    • Size

      899KB

    • MD5

      52ee41a4329c6874df19851ac928c8e8

    • SHA1

      ba47b57ff5b0c6d02ea5a1b80e96cee5387b03de

    • SHA256

      e7e7d51e82941b9eb56f82854e9682dc7a8593185ce6216082d5f795ceace582

    • SHA512

      6f640819de2f407337578e047df76aadc23f2062c0a798a47a05bd6407b924f286f71cb4ef1c00b568223ac8e5c05afa39261cdcf86e8e913ff0e23096c201ac

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus Main Payload

    • Orcurs Rat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks