General

  • Target

    a10a2f56cf719aa265c1dfcac6f99e6a2cdc776d7ebed7526b6ab85ea57f8674

  • Size

    2.6MB

  • Sample

    240420-bhq4fadc3z

  • MD5

    6ab2b08d7389f3c11a514e41b2aaad52

  • SHA1

    0695a6bc3b32a541385170d184817f849db2d5d7

  • SHA256

    a10a2f56cf719aa265c1dfcac6f99e6a2cdc776d7ebed7526b6ab85ea57f8674

  • SHA512

    85cb28bf7f0e67c7be0ff7761b050d42640a4389e0b096e9ea082fd4046b312b552c3ab7d003f879ef437c96515ab8c12e7313a2712474836f90bdbd7749a748

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxV:Hh+ZkldoPKiYdqd6t

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      a10a2f56cf719aa265c1dfcac6f99e6a2cdc776d7ebed7526b6ab85ea57f8674

    • Size

      2.6MB

    • MD5

      6ab2b08d7389f3c11a514e41b2aaad52

    • SHA1

      0695a6bc3b32a541385170d184817f849db2d5d7

    • SHA256

      a10a2f56cf719aa265c1dfcac6f99e6a2cdc776d7ebed7526b6ab85ea57f8674

    • SHA512

      85cb28bf7f0e67c7be0ff7761b050d42640a4389e0b096e9ea082fd4046b312b552c3ab7d003f879ef437c96515ab8c12e7313a2712474836f90bdbd7749a748

    • SSDEEP

      24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxV:Hh+ZkldoPKiYdqd6t

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks