General

  • Target

    b64d34a94a9b74df17386987b14954f987e49b323f7380b08e66bb0cccb0226b

  • Size

    5.0MB

  • Sample

    240416-cl65haeh68

  • MD5

    613f4471684355f7fe4d49e4fcebbe64

  • SHA1

    ebbc2cfaccef9d126f0f8350753e1f273f804673

  • SHA256

    b64d34a94a9b74df17386987b14954f987e49b323f7380b08e66bb0cccb0226b

  • SHA512

    eee18821de7e238859ac107cac85b607c7cd4fb44c4cc080ff8f0b8ae108ac7d324b9ed5efdb68f878a0d3f544b865a907728c541c8e2195952516055dd9092f

  • SSDEEP

    24576:Thg4MROxnFt3F9MQ2rZlI0AilFEvxHiLn:ThDMij45rZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

192.168.1.14:10134

Mutex

2e566c8c1d55430c963499cfd5b29253

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      b64d34a94a9b74df17386987b14954f987e49b323f7380b08e66bb0cccb0226b

    • Size

      5.0MB

    • MD5

      613f4471684355f7fe4d49e4fcebbe64

    • SHA1

      ebbc2cfaccef9d126f0f8350753e1f273f804673

    • SHA256

      b64d34a94a9b74df17386987b14954f987e49b323f7380b08e66bb0cccb0226b

    • SHA512

      eee18821de7e238859ac107cac85b607c7cd4fb44c4cc080ff8f0b8ae108ac7d324b9ed5efdb68f878a0d3f544b865a907728c541c8e2195952516055dd9092f

    • SSDEEP

      24576:Thg4MROxnFt3F9MQ2rZlI0AilFEvxHiLn:ThDMij45rZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks