General
-
Target
madara.exe
-
Size
904KB
-
MD5
1c5074f92366a713800a79d619a46858
-
SHA1
dfee3cb771537065354806b3aceab239bcad7226
-
SHA256
2e9ff6d0a4be51016b4636fe4869b3af64fc9496fc69c2be02dede6962ffdcc2
-
SHA512
3e3fce87ba6818e14e1966a9eee1833532f59ee777a4533967204cffd10e38a6bcc4bc27a59a78e9ce7e1f32b94c2f8f9da1ef39cff749653566b635f8a205fe
-
SSDEEP
12288:ZQPOEIY6uYjI3kuZ7dG1lFlWcYT70pxnnaaoawP7ueuRAorZNrI0AilFEvxHvBMk:/wV4MROxnFn9/rZlI0AilFEvxHi+N
Malware Config
Extracted
orcus
127.0.0.1:10134
0ae446808344459aa13c5eb373ecf6fd
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus
Files
-
madara.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 901KB - Virtual size: 900KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ