General
-
Target
Kogtervan.exe.vir
-
Size
1.2MB
-
Sample
220618-n9cfksbcb7
-
MD5
1557a74487c9a87068200ed57aa4f41c
-
SHA1
21c6fe977ffe351442dde5a67302d934448c2798
-
SHA256
e672d73cf01f809e167c3b42609d6eb719ae187313f083e4e0ce522d6e6d8f3f
-
SHA512
d1341180c9426a346bec55bd6ba606de52ffab8309868e28d276120817d20a587a74d58c442efa8cd125d2954b43ec4c0d5d1f88f9dd637d1c346853e75a3c44
Behavioral task
behavioral1
Sample
Kogtervan.exe
Resource
win7-20220414-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/921092565279850547/hht9p6Dov5UjlDv5Ho0zPIWCWLDfItsjCjCzkyreb1p0x6_xjYrced5Y9xHEMY-_qP8i
Extracted
orcus
User
212.220.202.104:1604
f3551b5b37bf41eb87431cb1dd626833
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\System\Update.exe
-
reconnect_delay
500
-
registry_keyname
Ocrus
-
taskscheduler_taskname
Ocrus
-
watchdog_path
AppData\system32
Targets
-
-
Target
Kogtervan.exe.vir
-
Size
1.2MB
-
MD5
1557a74487c9a87068200ed57aa4f41c
-
SHA1
21c6fe977ffe351442dde5a67302d934448c2798
-
SHA256
e672d73cf01f809e167c3b42609d6eb719ae187313f083e4e0ce522d6e6d8f3f
-
SHA512
d1341180c9426a346bec55bd6ba606de52ffab8309868e28d276120817d20a587a74d58c442efa8cd125d2954b43ec4c0d5d1f88f9dd637d1c346853e75a3c44
-
Orcus Main Payload
-
Orcurs Rat Executable
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-