General

  • Target

    tmp

  • Size

    920KB

  • MD5

    eb3cba58bb78fa152e27f7054a835358

  • SHA1

    42eb4aaeb45e06fee3fd7d2bab3d7efd9f8c6dd4

  • SHA256

    e19c764d8c70cfecf85aee9f560f843a19c0819b921ecbc26f036cb70f4533d7

  • SHA512

    1627fdb87b79f82bb391212dd1a0fa3db9296c345bb779c316245e6c8d4ed1ed1dd4cb26cfe1ca32a2d2a311361eb829d177fe319a2cd8e90ecc1027c720d0f1

  • SSDEEP

    24576:Jtb4MROxnFZ3LRM4GrrcI0AilFEvxHPJooR:JiMi7LlGrrcI0AilFEvxHP

Score
10/10

Malware Config

Extracted

Family

orcus

Botnet

activator

C2

gethack.ddns.net:10134

Mutex

45e4a05c11474da99d1995456204a702

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\kms\activator.exe

  • reconnect_delay

    10000

  • registry_keyname

    kms

  • taskscheduler_taskname

    kms

  • watchdog_path

    AppData\activator_res.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs

Files

  • tmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections