General
-
Target
4e441dcbac9fd22e565fb19a74810c63307870541228520b4eb43bd1bc764e95
-
Size
83KB
-
Sample
221019-gxw6wsfeaj
-
MD5
6d3abb049a40f36d08c71b58339f2f16
-
SHA1
606609fae1dde24d6b56dc4ebbb174146bc7b868
-
SHA256
4e441dcbac9fd22e565fb19a74810c63307870541228520b4eb43bd1bc764e95
-
SHA512
3cca0ceb34ea06a42c73e8b52f1da8eeea536678e52d4c5a19e6d49d134aeb2c13715148136b68fd805e6988b91bf315c9816bbc1cbda6173df5219a175cd51b
-
SSDEEP
768:NzooK6h6RxrWXqv1WlQOZecRCWSsS/XrELY2435R//ogFv924ZfZXwTrcDO7O8Ki:9EM6rUqvhBFSS/X4EX3ou12TIPU
Static task
static1
Malware Config
Extracted
quasar
1.4.0
SKYNET
173.225.115.99:7702
938cda17-a814-4925-8420-83a35a350164
-
encryption_key
F04A75E6507173FAEEC2BB82C564030A5E8413FF
-
install_name
FileHistory.exe
-
log_directory
Logs
-
reconnect_delay
4000
-
startup_key
FileHistory
-
subdirectory
FileHistory
Extracted
orcus
146.70.143.176:81
712d31c7a3f54904a08d968a15b836e9
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\orc\orc.exe
-
reconnect_delay
10000
-
registry_keyname
orc
-
taskscheduler_taskname
orc
-
watchdog_path
AppData\Watchdog.exe
Targets
-
-
Target
4e441dcbac9fd22e565fb19a74810c63307870541228520b4eb43bd1bc764e95
-
Size
83KB
-
MD5
6d3abb049a40f36d08c71b58339f2f16
-
SHA1
606609fae1dde24d6b56dc4ebbb174146bc7b868
-
SHA256
4e441dcbac9fd22e565fb19a74810c63307870541228520b4eb43bd1bc764e95
-
SHA512
3cca0ceb34ea06a42c73e8b52f1da8eeea536678e52d4c5a19e6d49d134aeb2c13715148136b68fd805e6988b91bf315c9816bbc1cbda6173df5219a175cd51b
-
SSDEEP
768:NzooK6h6RxrWXqv1WlQOZecRCWSsS/XrELY2435R//ogFv924ZfZXwTrcDO7O8Ki:9EM6rUqvhBFSS/X4EX3ou12TIPU
-
Orcus main payload
-
Quasar payload
-
Orcurs Rat Executable
-
PlagueBot Executable
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-