General
-
Target
699bba3ff06cd892c401848349e9fa24b3fac00e7e1be32a44eaf8dda422b9e2
-
Size
2.6MB
-
Sample
240419-bvntvacg27
-
MD5
5039dc4ba5e4479d55df720f4a9e656c
-
SHA1
0f938a06547c11ddfbed436fe62a17eae3d665be
-
SHA256
699bba3ff06cd892c401848349e9fa24b3fac00e7e1be32a44eaf8dda422b9e2
-
SHA512
e4f95e8fd2d6c554277724dfb8859bd545ba2a522f7fe290cd18f56f089a9e71b904bd22e94a2b091975947574ae79a5660c9f853dc46485f0474bbdd1f46132
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxg:Hh+ZkldoPKiYdqd64
Static task
static1
Behavioral task
behavioral1
Sample
699bba3ff06cd892c401848349e9fa24b3fac00e7e1be32a44eaf8dda422b9e2.exe
Resource
win7-20240215-en
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
699bba3ff06cd892c401848349e9fa24b3fac00e7e1be32a44eaf8dda422b9e2
-
Size
2.6MB
-
MD5
5039dc4ba5e4479d55df720f4a9e656c
-
SHA1
0f938a06547c11ddfbed436fe62a17eae3d665be
-
SHA256
699bba3ff06cd892c401848349e9fa24b3fac00e7e1be32a44eaf8dda422b9e2
-
SHA512
e4f95e8fd2d6c554277724dfb8859bd545ba2a522f7fe290cd18f56f089a9e71b904bd22e94a2b091975947574ae79a5660c9f853dc46485f0474bbdd1f46132
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxg:Hh+ZkldoPKiYdqd64
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-