Analysis Overview
SHA256
5de27d41560716e77970ad4a0818aaa3af2bcfaf84278d9ccdbcb78bf41a8010
Threat Level: Known bad
The file 5de27d41560716e77970ad4a0818aaa3af2bcfaf84278d9ccdbcb78bf41a8010 was found to be: Known bad.
Malicious Activity Summary
Orcurs Rat Executable
Orcus family
Orcus main payload
Orcus
Orcurs Rat Executable
Unsigned PE
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-12-02 02:08
Signatures
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Orcus family
Orcus main payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-12-02 02:08
Reported
2023-12-02 02:10
Platform
win7-20231130-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
Orcus
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5de27d41560716e77970ad4a0818aaa3af2bcfaf84278d9ccdbcb78bf41a8010.exe
"C:\Users\Admin\AppData\Local\Temp\5de27d41560716e77970ad4a0818aaa3af2bcfaf84278d9ccdbcb78bf41a8010.exe"
Network
Files
memory/2984-0-0x0000000001200000-0x00000000012EA000-memory.dmp
memory/2984-1-0x00000000740E0000-0x00000000747CE000-memory.dmp
memory/2984-2-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
memory/2984-3-0x0000000000200000-0x000000000020E000-memory.dmp
memory/2984-4-0x0000000000550000-0x00000000005AC000-memory.dmp
memory/2984-5-0x0000000000290000-0x00000000002A2000-memory.dmp
memory/2984-6-0x00000000002B0000-0x00000000002B8000-memory.dmp
memory/2984-7-0x00000000740E0000-0x00000000747CE000-memory.dmp
memory/2984-8-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-12-02 02:08
Reported
2023-12-02 02:10
Platform
win10v2004-20231127-en
Max time kernel
142s
Max time network
152s
Command Line
Signatures
Orcus
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5de27d41560716e77970ad4a0818aaa3af2bcfaf84278d9ccdbcb78bf41a8010.exe
"C:\Users\Admin\AppData\Local\Temp\5de27d41560716e77970ad4a0818aaa3af2bcfaf84278d9ccdbcb78bf41a8010.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 39.142.81.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.175.53.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 90.65.42.20.in-addr.arpa | udp |
Files
memory/4432-0-0x0000000074C30000-0x00000000753E0000-memory.dmp
memory/4432-1-0x00000000003D0000-0x00000000004BA000-memory.dmp
memory/4432-2-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
memory/4432-3-0x0000000004DA0000-0x0000000004DAE000-memory.dmp
memory/4432-4-0x0000000004E50000-0x0000000004EAC000-memory.dmp
memory/4432-5-0x0000000005460000-0x0000000005A04000-memory.dmp
memory/4432-6-0x0000000004FD0000-0x0000000005062000-memory.dmp
memory/4432-7-0x0000000004FB0000-0x0000000004FC2000-memory.dmp
memory/4432-8-0x0000000004FC0000-0x0000000004FC8000-memory.dmp
memory/4432-9-0x0000000005C10000-0x0000000005C1A000-memory.dmp
memory/4432-10-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
memory/4432-11-0x0000000074C30000-0x00000000753E0000-memory.dmp
memory/4432-12-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
memory/4432-13-0x0000000004DC0000-0x0000000004DD0000-memory.dmp