Malware Analysis Report

2025-01-22 15:08

Sample ID 240209-bd1r3sfb99
Target 9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35
SHA256 9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35
Tags
orcus rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35

Threat Level: Known bad

The file 9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35 was found to be: Known bad.

Malicious Activity Summary

orcus rat spyware stealer

Orcurs Rat Executable

Orcus family

Orcus main payload

Orcus

Orcurs Rat Executable

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-09 01:02

Signatures

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-09 01:02

Reported

2024-02-09 01:05

Platform

win7-20231129-en

Max time kernel

122s

Max time network

130s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35.exe

"C:\Users\Admin\AppData\Local\Temp\9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35.exe"

Network

N/A

Files

memory/2360-0-0x0000000000100000-0x00000000001EA000-memory.dmp

memory/2360-2-0x0000000000B50000-0x0000000000B90000-memory.dmp

memory/2360-1-0x0000000074B70000-0x000000007525E000-memory.dmp

memory/2360-3-0x0000000000420000-0x000000000042E000-memory.dmp

memory/2360-4-0x00000000009E0000-0x0000000000A3C000-memory.dmp

memory/2360-5-0x0000000000730000-0x0000000000742000-memory.dmp

memory/2360-6-0x0000000074B70000-0x000000007525E000-memory.dmp

memory/2360-7-0x0000000000B50000-0x0000000000B90000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-09 01:02

Reported

2024-02-09 01:05

Platform

win10v2004-20231215-en

Max time kernel

146s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35.exe

"C:\Users\Admin\AppData\Local\Temp\9a3ea174e96c66c02382df5e2bb898ab5da8a10dce278e867ed3fb0b65385d35.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/4112-0-0x0000000000440000-0x000000000052A000-memory.dmp

memory/4112-1-0x0000000075180000-0x0000000075930000-memory.dmp

memory/4112-2-0x00000000050C0000-0x00000000050D0000-memory.dmp

memory/4112-3-0x0000000002A30000-0x0000000002A3E000-memory.dmp

memory/4112-4-0x0000000004EA0000-0x0000000004EFC000-memory.dmp

memory/4112-5-0x0000000005680000-0x0000000005C24000-memory.dmp

memory/4112-6-0x00000000050D0000-0x0000000005162000-memory.dmp

memory/4112-7-0x0000000005540000-0x0000000005552000-memory.dmp

memory/4112-8-0x00000000055D0000-0x00000000055DA000-memory.dmp

memory/4112-9-0x0000000075180000-0x0000000075930000-memory.dmp

memory/4112-10-0x00000000050C0000-0x00000000050D0000-memory.dmp