General
-
Target
aa9deb2a1d67a4e73e7419b86535f1197dc8b7ffebdd392fb35f7c10d92b9dc1
-
Size
20KB
-
Sample
221019-gxwv5afdhr
-
MD5
3d8c4196a887f0056103f09ca6717826
-
SHA1
b8993d7cdeab70f1775f486837ae671ed3cce456
-
SHA256
aa9deb2a1d67a4e73e7419b86535f1197dc8b7ffebdd392fb35f7c10d92b9dc1
-
SHA512
88c8ccad020ea479b7eba1dd4b4b8e86ac13485c79f41ef39f552b58819fb70d6a75e339ebf9cea8a06d7e5ab4dd775081da91ce46a5f952453ce4471b6a2d22
-
SSDEEP
384:MntlikEpJ6xs9oNUhW2Ob0JaMRPJFInKZBsgbN1aO9sdBnfk7:MntZ0fyb0JpEalpv6nfk
Static task
static1
Malware Config
Extracted
quasar
1.4.0
SKYNET
173.225.115.99:7702
938cda17-a814-4925-8420-83a35a350164
-
encryption_key
F04A75E6507173FAEEC2BB82C564030A5E8413FF
-
install_name
FileHistory.exe
-
log_directory
Logs
-
reconnect_delay
4000
-
startup_key
FileHistory
-
subdirectory
FileHistory
Extracted
orcus
146.70.143.176:81
712d31c7a3f54904a08d968a15b836e9
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\orc\orc.exe
-
reconnect_delay
10000
-
registry_keyname
orc
-
taskscheduler_taskname
orc
-
watchdog_path
AppData\Watchdog.exe
Targets
-
-
Target
aa9deb2a1d67a4e73e7419b86535f1197dc8b7ffebdd392fb35f7c10d92b9dc1
-
Size
20KB
-
MD5
3d8c4196a887f0056103f09ca6717826
-
SHA1
b8993d7cdeab70f1775f486837ae671ed3cce456
-
SHA256
aa9deb2a1d67a4e73e7419b86535f1197dc8b7ffebdd392fb35f7c10d92b9dc1
-
SHA512
88c8ccad020ea479b7eba1dd4b4b8e86ac13485c79f41ef39f552b58819fb70d6a75e339ebf9cea8a06d7e5ab4dd775081da91ce46a5f952453ce4471b6a2d22
-
SSDEEP
384:MntlikEpJ6xs9oNUhW2Ob0JaMRPJFInKZBsgbN1aO9sdBnfk7:MntZ0fyb0JpEalpv6nfk
-
Orcus main payload
-
Quasar payload
-
Orcurs Rat Executable
-
PlagueBot Executable
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-