General

  • Target

    29c34406bc0b9ae5c44474529917fd6e2177f66381131aa2ede5bfb6da334d96.zip

  • Size

    2.6MB

  • MD5

    f636f06e1b0627025c4b6527aa6a3c15

  • SHA1

    6d3a292c366db88671eb9ff103610e87e3e70cc1

  • SHA256

    aafc636bf86569098d54c01b94a582f118f16b6744925ee0b2816164526b2282

  • SHA512

    0f3dc26e011057ee0f7b800d5076959eec11c3a87021c64f5e808b387527c585b758f8996a936c9c5ce1fc794819030919c0d9f64b5e2fe12c4c993a1f7b6b62

  • SSDEEP

    49152:oB0DpFNItvLdQut9sZ6isNPeSu7v8Dk5bVkt2UVAArch7CfHtS20drVIxTv:oGItvNt9sZVGmR78DAVkEUfrcoHtQrkD

Score
10/10

Malware Config

Extracted

Family

orcus

Botnet

Sln

C2

193.138.195.211:10134

Mutex

eaf050d367294b239fe7db992d6ea4d7

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    svchost

  • taskscheduler_taskname

    svc host

  • watchdog_path

    AppData\svchost.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs

Files

  • 29c34406bc0b9ae5c44474529917fd6e2177f66381131aa2ede5bfb6da334d96.zip
    .zip

    Password: infected

  • 29c34406bc0b9ae5c44474529917fd6e2177f66381131aa2ede5bfb6da334d96.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections