General

  • Target

    BlizzardMiner.exe

  • Size

    2.4MB

  • MD5

    495df1e3a99e9a5a742aa769319f2e79

  • SHA1

    ef2cc538967cca464bfff37249f72f076baf9403

  • SHA256

    6ee1f663cd593a8cfba89aa112ee3ae2675ae604c45f2b1f2ca701fe41ad3b87

  • SHA512

    a604ba437974f81490f01c469fd0b56f7653df9e62fc47b714a60548962218c00b3bdd0ca4d0382f9f2b0caf6e44d74d2c7e7c26b374eb0a7f00ec566b468114

  • SSDEEP

    24576:E554MROxnFf3PumYrrcI0AilFEvxHPbooD:EQMidSrrcI0AilFEvxHP

Score
10/10

Malware Config

Extracted

Family

orcus

C2

7.tcp.eu.ngrok.io:15748

Mutex

340a647d044e48eaa21fd7b828b66940

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\UWPApps\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    svchost

  • taskscheduler_taskname

    svchost

  • watchdog_path

    AppData\svchost.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BlizzardMiner.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections