Malware Analysis Report

2025-03-15 06:56

Sample ID 231224-w51xdagdhr
Target 5B64A3DB50378381C71F3A1BABC7D068.exe
SHA256 1ac7749a44fef2fa60a572c1a6d169c621c9e68be7a0184d3071190e831151b7
Tags
orcus rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1ac7749a44fef2fa60a572c1a6d169c621c9e68be7a0184d3071190e831151b7

Threat Level: Known bad

The file 5B64A3DB50378381C71F3A1BABC7D068.exe was found to be: Known bad.

Malicious Activity Summary

orcus rat spyware stealer

Orcus

Orcurs Rat Executable

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-24 18:31

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-24 18:31

Reported

2023-12-24 18:34

Platform

win7-20231215-en

Max time kernel

118s

Max time network

168s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe

"C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe"

Network

Country Destination Domain Proto
HK 45.204.82.103:6606 tcp
HK 45.204.82.103:6606 tcp

Files

memory/860-0-0x0000000000F20000-0x000000000104A000-memory.dmp

memory/860-1-0x0000000074E00000-0x00000000754EE000-memory.dmp

memory/860-2-0x0000000074E00000-0x00000000754EE000-memory.dmp

memory/860-3-0x0000000004B60000-0x0000000004C48000-memory.dmp

memory/860-4-0x0000000004C70000-0x0000000004CB0000-memory.dmp

memory/860-5-0x00000000002F0000-0x00000000002FE000-memory.dmp

memory/860-6-0x0000000000850000-0x00000000008AC000-memory.dmp

memory/860-7-0x0000000077E40000-0x0000000077E41000-memory.dmp

memory/860-8-0x00000000004F0000-0x0000000000502000-memory.dmp

memory/860-9-0x0000000000610000-0x0000000000628000-memory.dmp

memory/860-10-0x0000000000650000-0x0000000000660000-memory.dmp

memory/860-18-0x0000000004C70000-0x0000000004CB0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabCD40.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-24 18:31

Reported

2023-12-24 18:33

Platform

win10v2004-20231215-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe

"C:\Users\Admin\AppData\Local\Temp\5B64A3DB50378381C71F3A1BABC7D068.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 5.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 138.91.171.81:80 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 211.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 178.223.142.52.in-addr.arpa udp
HK 45.204.82.103:6606 tcp
US 8.8.8.8:53 103.82.204.45.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
GB 88.221.135.217:80 tcp
US 8.8.8.8:53 udp

Files

memory/3616-1-0x00000000750A0000-0x0000000075850000-memory.dmp

memory/3616-0-0x0000000000840000-0x000000000096A000-memory.dmp

memory/3616-2-0x00000000750A0000-0x0000000075850000-memory.dmp

memory/3616-3-0x0000000077BA1000-0x0000000077BA2000-memory.dmp

memory/3616-4-0x00000000056A0000-0x000000000573C000-memory.dmp

memory/3616-7-0x0000000005360000-0x000000000536E000-memory.dmp

memory/3616-8-0x0000000005370000-0x00000000053CC000-memory.dmp

memory/3616-6-0x00000000053F0000-0x0000000005400000-memory.dmp

memory/3616-10-0x00000000058D0000-0x0000000005962000-memory.dmp

memory/3616-9-0x0000000005DE0000-0x0000000006384000-memory.dmp

memory/3616-5-0x0000000005740000-0x0000000005828000-memory.dmp

memory/3616-12-0x0000000005890000-0x00000000058A8000-memory.dmp

memory/3616-11-0x0000000005880000-0x0000000005892000-memory.dmp

memory/3616-14-0x0000000005D10000-0x0000000005D1A000-memory.dmp

memory/3616-13-0x0000000005CF0000-0x0000000005D00000-memory.dmp

memory/3616-17-0x0000000007130000-0x0000000007196000-memory.dmp

memory/3616-19-0x0000000006610000-0x0000000006622000-memory.dmp

memory/3616-21-0x0000000007220000-0x000000000726C000-memory.dmp

memory/3616-20-0x00000000071E0000-0x000000000721C000-memory.dmp

memory/3616-18-0x00000000077C0000-0x0000000007DD8000-memory.dmp

memory/3616-22-0x0000000007380000-0x000000000748A000-memory.dmp

memory/3616-23-0x0000000007DE0000-0x0000000007FA2000-memory.dmp

memory/3616-24-0x00000000053F0000-0x0000000005400000-memory.dmp