Behavioral task
behavioral1
Sample
built.exe
Resource
win7-20220812-en
General
-
Target
built.exe
-
Size
926KB
-
MD5
7664a1884dd4abbd210a056b8f4ee4dd
-
SHA1
f1efa203e677b79f5b8ac19618a7a91dd6114b8f
-
SHA256
3e67a1b8090106a30eb6c9b33d4b9068746679cb7690f7d267cbf584cc7d9a1a
-
SHA512
cd75744526184bbb6288d44d0d21a3e054134194bc31655d78ccb21e41c1dd08201becb0b06c4492552808297e627fc979860c107c9325c08a99219bab3f8843
-
SSDEEP
24576:jrA4MROxnFvh7OADrZlI0AilFEvxHi34:jrjMiVBrZlI0AilFEvxHi
Malware Config
Extracted
orcus
0.0.0.0:10134
a50b79c32af14c6899fac945490def46
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Discord Updator
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus
Files
-
built.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 921KB - Virtual size: 920KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ