Malware Analysis Report

2025-03-15 06:49

Sample ID 240107-bdrjeacge5
Target 61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3
SHA256 61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3
Tags
orcus rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3

Threat Level: Known bad

The file 61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3 was found to be: Known bad.

Malicious Activity Summary

orcus rat spyware stealer

Orcus

Orcurs Rat Executable

Orcus family

Orcus main payload

Orcurs Rat Executable

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-01-07 01:02

Signatures

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-07 01:02

Reported

2024-01-07 01:04

Platform

win10v2004-20231215-en

Max time kernel

1s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3.exe

"C:\Users\Admin\AppData\Local\Temp\61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 85.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 5.173.189.20.in-addr.arpa udp

Files

memory/2400-1-0x0000000000520000-0x000000000060E000-memory.dmp

memory/2400-2-0x0000000004F80000-0x0000000004F90000-memory.dmp

memory/2400-3-0x0000000004F60000-0x0000000004F6E000-memory.dmp

memory/2400-5-0x0000000005620000-0x0000000005BC4000-memory.dmp

memory/2400-6-0x0000000005120000-0x00000000051B2000-memory.dmp

memory/2400-4-0x0000000004F90000-0x0000000004FEC000-memory.dmp

memory/2400-0-0x00000000746B0000-0x0000000074E60000-memory.dmp

memory/2400-8-0x0000000005110000-0x0000000005118000-memory.dmp

memory/2400-10-0x0000000005CD0000-0x0000000005D36000-memory.dmp

memory/2400-12-0x0000000005D60000-0x0000000005D72000-memory.dmp

memory/2400-13-0x0000000005DC0000-0x0000000005DFC000-memory.dmp

memory/2400-14-0x0000000005E00000-0x0000000005E4C000-memory.dmp

memory/2400-11-0x0000000006360000-0x0000000006978000-memory.dmp

memory/2400-9-0x0000000005540000-0x0000000005548000-memory.dmp

memory/2400-7-0x0000000005100000-0x0000000005112000-memory.dmp

memory/2400-15-0x0000000005F70000-0x000000000607A000-memory.dmp

memory/2400-17-0x0000000006320000-0x000000000632A000-memory.dmp

memory/2400-18-0x0000000004F80000-0x0000000004F90000-memory.dmp

memory/2400-19-0x00000000746B0000-0x0000000074E60000-memory.dmp

memory/2400-20-0x0000000004F80000-0x0000000004F90000-memory.dmp

memory/2400-21-0x0000000004F80000-0x0000000004F90000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-07 01:02

Reported

2024-01-07 01:04

Platform

win7-20231129-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3.exe

"C:\Users\Admin\AppData\Local\Temp\61b166b4e62614e6497ee5912dfa4a18a7867c08c40ce412509c71a4ae1fbae3.exe"

Network

N/A

Files

memory/1368-2-0x0000000004BA0000-0x0000000004BE0000-memory.dmp

memory/1368-4-0x0000000000760000-0x00000000007BC000-memory.dmp

memory/1368-3-0x0000000000610000-0x000000000061E000-memory.dmp

memory/1368-1-0x0000000073EF0000-0x00000000745DE000-memory.dmp

memory/1368-5-0x00000000006B0000-0x00000000006C2000-memory.dmp

memory/1368-7-0x00000000007C0000-0x00000000007C8000-memory.dmp

memory/1368-6-0x0000000000710000-0x0000000000718000-memory.dmp

memory/1368-0-0x0000000000830000-0x000000000091E000-memory.dmp

memory/1368-9-0x0000000073EF0000-0x00000000745DE000-memory.dmp

memory/1368-10-0x0000000004BA0000-0x0000000004BE0000-memory.dmp