Behavioral task
behavioral1
Sample
0daab45c6eac476ff814f8f5d5a34bdbfab09d673878ce21774ffdc122e16658.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0daab45c6eac476ff814f8f5d5a34bdbfab09d673878ce21774ffdc122e16658.exe
Resource
win10v2004-20220414-en
General
-
Target
0daab45c6eac476ff814f8f5d5a34bdbfab09d673878ce21774ffdc122e16658
-
Size
907KB
-
MD5
bcd5ffb00134d19c5c3aa9de7b8db9bd
-
SHA1
dc0fc76a09f2dadcbbd2350703463264c74dbb6d
-
SHA256
0daab45c6eac476ff814f8f5d5a34bdbfab09d673878ce21774ffdc122e16658
-
SHA512
0111a7f671415f96ee32a9eeb190bbf57c185b4d2c007b57cc2fafab3f225fe9b8fdc0e49ca9c80cc6040b004e7efa98b2a4b26248d22e76ea7676de10819f6b
-
SSDEEP
24576:zOb04MROxnFegHFrZlI0AilFEvxHif+Y:zObMiPFrZlI0AilFEvxHi
Malware Config
Extracted
orcus
Spoofer
192.168.68.103:10134
e94e8afe28a24a80ab033a0e96e3c0c3
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule sample orcus -
Orcus Main Payload 1 IoCs
Processes:
resource yara_rule sample family_orcus -
Orcus family
Files
-
0daab45c6eac476ff814f8f5d5a34bdbfab09d673878ce21774ffdc122e16658.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 902KB - Virtual size: 902KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ