Behavioral task
behavioral1
Sample
96c6c8a692801bf8c71e2cbe76ec858c4e2b05b62d5513ab8699fa121478aaa5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96c6c8a692801bf8c71e2cbe76ec858c4e2b05b62d5513ab8699fa121478aaa5.exe
Resource
win10v2004-20231222-en
General
-
Target
96c6c8a692801bf8c71e2cbe76ec858c4e2b05b62d5513ab8699fa121478aaa5
-
Size
5.0MB
-
MD5
9e1d310ca43ece16b4f87ecd6b199f4b
-
SHA1
e30216e1f9da8549b2a8529735eca256632d2139
-
SHA256
96c6c8a692801bf8c71e2cbe76ec858c4e2b05b62d5513ab8699fa121478aaa5
-
SHA512
4e3b1570729cf98bb967d00ae569f9266af658ac9409c53b6fa8cf0eddd63fe8ab2aab4c3075500ee951a9cbcec84fa0b0d12be2e6647b6956c8578073533753
-
SSDEEP
24576:6Eqr4MROxnFi3NUrBrZlI0AilFEvxHi/1:6EjMioCVrZlI0AilFEvxHi
Malware Config
Extracted
orcus
77.246.110.208:8888
9a11a86ac0a34ca2a13e9c521e64f838
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\Steam\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
svchost
-
taskscheduler_taskname
svchost
-
watchdog_path
Temp\svchost.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96c6c8a692801bf8c71e2cbe76ec858c4e2b05b62d5513ab8699fa121478aaa5
Files
-
96c6c8a692801bf8c71e2cbe76ec858c4e2b05b62d5513ab8699fa121478aaa5.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ