General
-
Target
53c771f788400c11c3d86c75e8528bb9a1eed660cc5cdd13502c4c127ea645ac
-
Size
2.6MB
-
Sample
240419-btlm4adg2y
-
MD5
baaa35e151302009a1e829c42b1a4c15
-
SHA1
bbd81a4f7c2990ce01eeeeb7423abcb83007746b
-
SHA256
53c771f788400c11c3d86c75e8528bb9a1eed660cc5cdd13502c4c127ea645ac
-
SHA512
a0d2085681116ab17f735b52f3e01512b97ac272b83d1a9a04dee5773c78e0f56c4c98e0ef32a1235f1ab53701a93614df50b9dfc7f6d34e5cef1614474d43e9
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx1:Hh+ZkldoPKiYdqd6N
Static task
static1
Behavioral task
behavioral1
Sample
53c771f788400c11c3d86c75e8528bb9a1eed660cc5cdd13502c4c127ea645ac.exe
Resource
win7-20240221-en
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
53c771f788400c11c3d86c75e8528bb9a1eed660cc5cdd13502c4c127ea645ac
-
Size
2.6MB
-
MD5
baaa35e151302009a1e829c42b1a4c15
-
SHA1
bbd81a4f7c2990ce01eeeeb7423abcb83007746b
-
SHA256
53c771f788400c11c3d86c75e8528bb9a1eed660cc5cdd13502c4c127ea645ac
-
SHA512
a0d2085681116ab17f735b52f3e01512b97ac272b83d1a9a04dee5773c78e0f56c4c98e0ef32a1235f1ab53701a93614df50b9dfc7f6d34e5cef1614474d43e9
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx1:Hh+ZkldoPKiYdqd6N
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-