General

  • Target

    Downloader.hta

  • Size

    1KB

  • Sample

    240415-sxtljsca7v

  • MD5

    3c8fcca68536d9cc5e55b526e139fd75

  • SHA1

    0d28aff554f760e6b99534a30deca54640410b13

  • SHA256

    254cfad84234f93e2b1fa7f1d113ccc60f21ebc5f1cff991afd10e45339a9a4c

  • SHA512

    b61788c97c1c8af30264a310b3d57025e760b3661fd2132bb5603f817852b6387f5a017aa4b51dd2c31ce4fbe99e1afd20a75ccabfdf02db11a121e4aba3271c

Malware Config

Extracted

Family

orcus

C2

s7vety-47274.portmap.host:47274

Mutex

dd6ac135bc344ba3be035bc19a9835dc

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %temp%\Windows Updater\updateclient.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      Downloader.hta

    • Size

      1KB

    • MD5

      3c8fcca68536d9cc5e55b526e139fd75

    • SHA1

      0d28aff554f760e6b99534a30deca54640410b13

    • SHA256

      254cfad84234f93e2b1fa7f1d113ccc60f21ebc5f1cff991afd10e45339a9a4c

    • SHA512

      b61788c97c1c8af30264a310b3d57025e760b3661fd2132bb5603f817852b6387f5a017aa4b51dd2c31ce4fbe99e1afd20a75ccabfdf02db11a121e4aba3271c

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks