General

  • Target

    1407c316ae266116eff2a7c2f40d8d3508dba301f8175d498be69c9d48a311ca

  • Size

    918KB

  • Sample

    240120-brqt2ahee9

  • MD5

    beff93c13a3839484a3248f3a1702516

  • SHA1

    77d2620d977c1b7730a599da82efd7360898f309

  • SHA256

    1407c316ae266116eff2a7c2f40d8d3508dba301f8175d498be69c9d48a311ca

  • SHA512

    fdf7ad1b65283101b1852badc92d09507a82eb13771d0676452f712fa26b649f20b18d970cf7c5f9bd43bf87b9252bd2ae76d9e11ef1addc0778565342a19a28

  • SSDEEP

    24576:k1I4MROxnFi3ArIrZlI0AilFEvxHi18D:k1rMioAMrZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

Botnet

Hack

C2

127.0.0.1:10134

Mutex

d7904e4fe3184c208642abe8f5cf9293

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    C:\Windows\System32\tŠ°skmgr.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    GoogleUpdateTaskMachine

  • watchdog_path

    AppData\smss.exe

Targets

    • Target

      1407c316ae266116eff2a7c2f40d8d3508dba301f8175d498be69c9d48a311ca

    • Size

      918KB

    • MD5

      beff93c13a3839484a3248f3a1702516

    • SHA1

      77d2620d977c1b7730a599da82efd7360898f309

    • SHA256

      1407c316ae266116eff2a7c2f40d8d3508dba301f8175d498be69c9d48a311ca

    • SHA512

      fdf7ad1b65283101b1852badc92d09507a82eb13771d0676452f712fa26b649f20b18d970cf7c5f9bd43bf87b9252bd2ae76d9e11ef1addc0778565342a19a28

    • SSDEEP

      24576:k1I4MROxnFi3ArIrZlI0AilFEvxHi18D:k1rMioAMrZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks