Malware Analysis Report

2025-03-15 06:53

Sample ID 231209-ccj9daebaj
Target 97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6
SHA256 97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6
Tags
orcus rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6

Threat Level: Known bad

The file 97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6 was found to be: Known bad.

Malicious Activity Summary

orcus rat spyware stealer

Orcurs Rat Executable

Orcus family

Orcus main payload

Orcus

Orcurs Rat Executable

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-09 01:55

Signatures

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-09 01:55

Reported

2023-12-09 01:58

Platform

win7-20231023-en

Max time kernel

120s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6.exe

"C:\Users\Admin\AppData\Local\Temp\97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6.exe"

Network

N/A

Files

memory/2216-0-0x0000000000300000-0x00000000003EE000-memory.dmp

memory/2216-1-0x0000000074650000-0x0000000074D3E000-memory.dmp

memory/2216-2-0x0000000000420000-0x0000000000460000-memory.dmp

memory/2216-3-0x0000000000270000-0x000000000027E000-memory.dmp

memory/2216-4-0x0000000000670000-0x00000000006CC000-memory.dmp

memory/2216-5-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2216-6-0x0000000000750000-0x0000000000758000-memory.dmp

memory/2216-7-0x0000000000760000-0x0000000000768000-memory.dmp

memory/2216-8-0x0000000000420000-0x0000000000460000-memory.dmp

memory/2216-9-0x0000000074650000-0x0000000074D3E000-memory.dmp

memory/2216-10-0x0000000000420000-0x0000000000460000-memory.dmp

memory/2216-11-0x0000000000420000-0x0000000000460000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-09 01:55

Reported

2023-12-09 01:58

Platform

win10v2004-20231130-en

Max time kernel

144s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6.exe

"C:\Users\Admin\AppData\Local\Temp\97830cf3009570964407552450de9b2f7295c7de74707f99b770e26d925f4af6.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 85.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 9.173.189.20.in-addr.arpa udp

Files

memory/2804-0-0x0000000000480000-0x000000000056E000-memory.dmp

memory/2804-1-0x0000000075220000-0x00000000759D0000-memory.dmp

memory/2804-2-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/2804-3-0x0000000002850000-0x000000000285E000-memory.dmp

memory/2804-4-0x0000000004EE0000-0x0000000004F3C000-memory.dmp

memory/2804-5-0x00000000055A0000-0x0000000005B44000-memory.dmp

memory/2804-6-0x0000000005090000-0x0000000005122000-memory.dmp

memory/2804-7-0x0000000005570000-0x0000000005582000-memory.dmp

memory/2804-9-0x0000000005590000-0x0000000005598000-memory.dmp

memory/2804-8-0x0000000005580000-0x0000000005588000-memory.dmp

memory/2804-10-0x0000000005CD0000-0x0000000005CDA000-memory.dmp

memory/2804-11-0x0000000075220000-0x00000000759D0000-memory.dmp

memory/2804-12-0x0000000004FE0000-0x0000000004FF0000-memory.dmp