General
-
Target
123xxx.exe
-
Size
907KB
-
Sample
231011-rqdfbaef47
-
MD5
8a8708ed2507d0907e08f10185d17bce
-
SHA1
6a3007eecffea8b616474e3a3f2a17660a567a22
-
SHA256
cdb7d368e382d1b82628e58928866e50683a194fc88308195a008225ab48b7e7
-
SHA512
f669d113ec12591af393c0ea7e662757d82d92c9ee3943dd39fc40e99621606c46ab3acc5ae8f4d7717391a195728fd9afa26e2e15d71aa5ac76d1fdf75bc744
-
SSDEEP
12288:Wgfe07KFML7iLMucoUe7dG1lFlWcYT70pxnnaaoawn7ueuRAxrZNrI0AilFEvxH9:/tY4MROxnFH9+rZlI0AilFEvxHiGWw
Behavioral task
behavioral1
Sample
123xxx.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
123xxx.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
orcus
de2.localto.net:41509
258334e365604d3ca90aaafdbf31c4c7
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\systemw\DSRHost.exe
-
reconnect_delay
10000
-
registry_keyname
DSRHost
-
taskscheduler_taskname
DSRHost
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
123xxx.exe
-
Size
907KB
-
MD5
8a8708ed2507d0907e08f10185d17bce
-
SHA1
6a3007eecffea8b616474e3a3f2a17660a567a22
-
SHA256
cdb7d368e382d1b82628e58928866e50683a194fc88308195a008225ab48b7e7
-
SHA512
f669d113ec12591af393c0ea7e662757d82d92c9ee3943dd39fc40e99621606c46ab3acc5ae8f4d7717391a195728fd9afa26e2e15d71aa5ac76d1fdf75bc744
-
SSDEEP
12288:Wgfe07KFML7iLMucoUe7dG1lFlWcYT70pxnnaaoawn7ueuRAxrZNrI0AilFEvxH9:/tY4MROxnFH9+rZlI0AilFEvxHiGWw
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-