General
-
Target
b3288fd1f6b8d44211066cfe23e459fb50be360bc83b7b9fa29cc2da2d5811e0
-
Size
2.6MB
-
Sample
240417-ckmdpsah62
-
MD5
33f3bbcd5ed87efe2c67e22c39f9d505
-
SHA1
897bc53886621e3ee4c327d27aa8f08e03c43c40
-
SHA256
b3288fd1f6b8d44211066cfe23e459fb50be360bc83b7b9fa29cc2da2d5811e0
-
SHA512
b0da4a17049a0d37daf0bb505be38ee0e37cb9a5efc46293d9535e3e36ad8f5956e650429409e10d2269f850f4071727c90e66176f708de9aeff27c1f1dd3e4a
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxZ:Hh+ZkldoPKiYdqd6x
Static task
static1
Behavioral task
behavioral1
Sample
b3288fd1f6b8d44211066cfe23e459fb50be360bc83b7b9fa29cc2da2d5811e0.exe
Resource
win7-20240221-en
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
b3288fd1f6b8d44211066cfe23e459fb50be360bc83b7b9fa29cc2da2d5811e0
-
Size
2.6MB
-
MD5
33f3bbcd5ed87efe2c67e22c39f9d505
-
SHA1
897bc53886621e3ee4c327d27aa8f08e03c43c40
-
SHA256
b3288fd1f6b8d44211066cfe23e459fb50be360bc83b7b9fa29cc2da2d5811e0
-
SHA512
b0da4a17049a0d37daf0bb505be38ee0e37cb9a5efc46293d9535e3e36ad8f5956e650429409e10d2269f850f4071727c90e66176f708de9aeff27c1f1dd3e4a
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxZ:Hh+ZkldoPKiYdqd6x
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-