General

  • Target

    ae3b8f9c622d0cd0c5e707dcf903eb3fedd5480fc8557d696398499b5b62db69

  • Size

    2.6MB

  • Sample

    240420-b9gdbaec6x

  • MD5

    d1a0e4b90390d2f9587556ebc0af4ba5

  • SHA1

    4383e9ed985deb247cf63018e1bb8f5b27e5365b

  • SHA256

    ae3b8f9c622d0cd0c5e707dcf903eb3fedd5480fc8557d696398499b5b62db69

  • SHA512

    bc3c799e5d9e70561f73f89f0ac370f74d86d678475ea0af04ea413bf9fbe697502e4ac150579e9b4660749f67b17d3dd4b5935e1fb5ba72cc4919e95832f163

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx7:Hh+ZkldoPKiYdqd6z

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      ae3b8f9c622d0cd0c5e707dcf903eb3fedd5480fc8557d696398499b5b62db69

    • Size

      2.6MB

    • MD5

      d1a0e4b90390d2f9587556ebc0af4ba5

    • SHA1

      4383e9ed985deb247cf63018e1bb8f5b27e5365b

    • SHA256

      ae3b8f9c622d0cd0c5e707dcf903eb3fedd5480fc8557d696398499b5b62db69

    • SHA512

      bc3c799e5d9e70561f73f89f0ac370f74d86d678475ea0af04ea413bf9fbe697502e4ac150579e9b4660749f67b17d3dd4b5935e1fb5ba72cc4919e95832f163

    • SSDEEP

      24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx7:Hh+ZkldoPKiYdqd6z

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks