General

  • Target

    4563fa06b9e2a308b48d6e342715b02b494170e4cceafa902d21bd8dd953ff8e

  • Size

    909KB

  • Sample

    220707-tghd1scba9

  • MD5

    0766f3d3a085ff223182010af4678eef

  • SHA1

    3b4c8be4d002121a9e604864fbe1897c598467c0

  • SHA256

    4563fa06b9e2a308b48d6e342715b02b494170e4cceafa902d21bd8dd953ff8e

  • SHA512

    7f4c05d364b4c683f7f7f054099200b21023abfb4ddea7f5f65133f6904d9fea10bfb616ab2a336893d5e31541a551730991f94e1a4610cd422a754022980254

Malware Config

Extracted

Family

orcus

C2

185.209.23.119:10134

Mutex

d4911beaeae0483b888d4daf666bbb74

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      4563fa06b9e2a308b48d6e342715b02b494170e4cceafa902d21bd8dd953ff8e

    • Size

      909KB

    • MD5

      0766f3d3a085ff223182010af4678eef

    • SHA1

      3b4c8be4d002121a9e604864fbe1897c598467c0

    • SHA256

      4563fa06b9e2a308b48d6e342715b02b494170e4cceafa902d21bd8dd953ff8e

    • SHA512

      7f4c05d364b4c683f7f7f054099200b21023abfb4ddea7f5f65133f6904d9fea10bfb616ab2a336893d5e31541a551730991f94e1a4610cd422a754022980254

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks