Behavioral task
behavioral1
Sample
ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.exe
Resource
win10v2004-20230220-en
General
-
Target
ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.zip
-
Size
587KB
-
MD5
32fb004f6f9b11926725fb875479dd8e
-
SHA1
5443f49e5f111cb7bbd6b7aea6c039e0daa2911a
-
SHA256
144947ddb462ddbdb8a4f1e3fdca9278e268e5fb918f154897477776676cdf7a
-
SHA512
d95f77bf685fc6c6668eb25e65ea8b346adfb6440f10b95b6c4e4bc0866acead0744097f3f9a9376cc82a66586c2a9ad793ef5c478048254c386c3ede7cbd643
-
SSDEEP
12288:XwlXNwE4as62IibxMOv1fVMnHPLi65AuBML2e4z4TXmqYtR:AcEmea51fVKTT5pML2e24jmF
Malware Config
Extracted
orcus
4.tcp.eu.ngrok.io:16452
1b704d0841c7486288b6ef5dfe82a084
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
C:\Program Files\Windows NT\TableTextService\en-US\english.exe
-
reconnect_delay
10000
-
registry_keyname
svchost
-
taskscheduler_taskname
Cortana
-
watchdog_path
AppData\WindowsDefender.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule static1/unpack001/ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.exe orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule static1/unpack001/ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.exe family_orcus
Files
-
ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.zip.zip
Password: infected
-
ddad33460be1dfc2c1739e69a6be544049fb471346c489da162926ef44acfe60.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 902KB - Virtual size: 901KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ