General

  • Target

    377df8469a63c932c38df4b5c9ce6b303e91910124175334fab26fba3578ea1a

  • Size

    3.0MB

  • MD5

    88d1d96e04e905a3c8a6fe8e8efd2158

  • SHA1

    2cd2aa418554bc4ea4c10b81bd72a23a60027fe1

  • SHA256

    377df8469a63c932c38df4b5c9ce6b303e91910124175334fab26fba3578ea1a

  • SHA512

    a3b77d89430a3ef88a9537be1a043ad59a8f506c6f07bd347402b2e5c62d77c967dbc831f8eb90bfa6179cb83bc69f5f93cee4ed5edca60feab1ecddaa85c35c

  • SSDEEP

    49152:BJgZcFSZeM9/4/OwVkFG6X4pyzv1IgczE6SAypQxbPQo9JnCm+WncFf0I74gu3Lx:B2iTJ/BVkzOyzdCznypSb4o9JCm

Score
10/10

Malware Config

Extracted

Family

orcus

C2

192.168.35.1/24:10134

Mutex

636bfa9e2a6d4e3296584db81adf3cf3

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\BypassMDM\BypassMDM.exe

  • reconnect_delay

    10000

  • registry_keyname

    BypassMDM

  • taskscheduler_taskname

    BypassMDM

  • watchdog_path

    AppData\BypassMDM_Watchdog.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 377df8469a63c932c38df4b5c9ce6b303e91910124175334fab26fba3578ea1a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections