Behavioral task
behavioral1
Sample
Extreme Injector V6.exe
Resource
win7-20230220-en
General
-
Target
Extreme Injector V6.exe
-
Size
9.0MB
-
MD5
12f8a4a361c7ab3345c4070501bc33a0
-
SHA1
2588391add0c541684b05908acfcc1cd13f8411f
-
SHA256
c6939bc875f81b901808a9ec37c55f1254f068cee9580fc84c2c8975c24d021b
-
SHA512
03a4de8d08c24c87ae0b5b94b6d760c5ee8bb5e021e91118b6b598b3260eda197b63709eca2f2b471e33b6d9fe4efe77d4272f05136b972e0f0f7d5f5fac1dc0
-
SSDEEP
12288:yXBM21gsgPktzYX7dG1lFlWcYT70pxnnaaoawUjKgRRAJrZNrI0AilFEvxHvBMFr:duQ4MROxnFSgHSrZlI0AilFEvxHiAS
Malware Config
Extracted
orcus
209.25.141.181:28100
10fdbd4780e94eb1a4597dbf84a240dd
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%Chrome Regsitry\Extreme Injector.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Chrome Updater
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Extreme Injector V6.exe
Files
-
Extreme Injector V6.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 902KB - Virtual size: 902KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ