General
-
Target
243cda7e2016e123c2dd5ef692453faa.bin
-
Size
903KB
-
Sample
231031-btgzxahg92
-
MD5
243cda7e2016e123c2dd5ef692453faa
-
SHA1
4fac29ed7fe7e9c705db12952e0512700cbbffba
-
SHA256
7cf6b911b16f7c2242ca1c4f436229ac45e977b4d97cdbf5969d12ab1b208050
-
SHA512
0cbccd66729bab04487d62724435146a96585a9893848e76d4399c3749fcdad265da96304bd8e5e891e3f4c93db598f2cbb20f14298efe6836bf322fefd7126a
-
SSDEEP
12288:00XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCnZsrNoHr3K55epH+H77dG1lFlj:/j54MROxnF2OVrrcI0AilFEvxHPCooi
Behavioral task
behavioral1
Sample
243cda7e2016e123c2dd5ef692453faa.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
243cda7e2016e123c2dd5ef692453faa.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
orcus
0.tcp.jp.ngrok.io:12238
dccc973615534ce2b7372df97d972a48
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Windows
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
243cda7e2016e123c2dd5ef692453faa.bin
-
Size
903KB
-
MD5
243cda7e2016e123c2dd5ef692453faa
-
SHA1
4fac29ed7fe7e9c705db12952e0512700cbbffba
-
SHA256
7cf6b911b16f7c2242ca1c4f436229ac45e977b4d97cdbf5969d12ab1b208050
-
SHA512
0cbccd66729bab04487d62724435146a96585a9893848e76d4399c3749fcdad265da96304bd8e5e891e3f4c93db598f2cbb20f14298efe6836bf322fefd7126a
-
SSDEEP
12288:00XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCnZsrNoHr3K55epH+H77dG1lFlj:/j54MROxnF2OVrrcI0AilFEvxHPCooi
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-