Behavioral task
behavioral1
Sample
5e3dab320890ff285f1559acdb4b4fc68ba833e3755e8514a7bedb03f34883c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5e3dab320890ff285f1559acdb4b4fc68ba833e3755e8514a7bedb03f34883c9.exe
Resource
win10v2004-20220812-en
General
-
Target
5e3dab320890ff285f1559acdb4b4fc68ba833e3755e8514a7bedb03f34883c9
-
Size
910KB
-
MD5
3814c7041e5e06a6d91a466f23a80d6f
-
SHA1
4ccc4c4f6e3fab733cc8f25d7b6c2d0fc0d4b5b2
-
SHA256
5e3dab320890ff285f1559acdb4b4fc68ba833e3755e8514a7bedb03f34883c9
-
SHA512
7028316502252da19dc29b63f28cc5a273a3dcc974734f1357b4ce6cb69d7e366860034fed07de05441c233206856eea273fb1f34c51e02e62e1db0731460208
-
SSDEEP
24576:ehg4MROxnFp/iJerZlI0AilFEvxHiPJ3:ehDMifK0rZlI0AilFEvxHiP
Malware Config
Extracted
orcus
s1.kekw.tk:1337
c3bfded8fe9d44f492312e9ce58f4e74
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus
Files
-
5e3dab320890ff285f1559acdb4b4fc68ba833e3755e8514a7bedb03f34883c9.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 905KB - Virtual size: 904KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ