Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
file.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
file.exe
Resource
win11-20231215-en
General
-
Target
file.bin.zip
-
Size
593KB
-
MD5
73410f0af68c8607e330c379428017bc
-
SHA1
b0d8ef387b9d97f86e3ac97ae0d1c53521dcfa30
-
SHA256
2a689fee9a10c060404a966ec83ed213241573a9bc96b3758379091a00d818d4
-
SHA512
c7fb2c4cdc9bbc78fbe5baa305a7753e3ce395ab768d4e64cb4a09ab4c61bd80e1aae00c9bcdd5d7a8ddeeed546249a953267dbf1d1dc6dd68e5d5e7af2f4954
-
SSDEEP
12288:UrD0boVUNwH7oSAIjsoYTi99RMDiOzayP433cd7okBbBfyEU8BhH:QD0sVUNa+IqO99CmvW4cnsD8BhH
Malware Config
Extracted
orcus
obfuscated.us:8080
0133d229c4e24006957c0e4ab3a52531
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule static1/unpack001/file.bin orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule static1/unpack001/file.bin family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/file.bin
Files
-
file.bin.zip.zip
Password: infected
-
file.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 911KB - Virtual size: 911KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ