General

  • Target

    a0f4041aee9c0195618c9a4ce20f4e68b4902fba611888287df70ae6134b57e9

  • Size

    914KB

  • Sample

    240420-bndejadd9x

  • MD5

    b9f085290297f38b044db9972812c826

  • SHA1

    496f122b6be87a63b68368ad4cbcad814c342672

  • SHA256

    a0f4041aee9c0195618c9a4ce20f4e68b4902fba611888287df70ae6134b57e9

  • SHA512

    f818d1cc3627e32bf30ee1a2ee6800ba858eaa08a3b5a37e9e7ac4fde545c0c1d71ff062ac9da4392ec53053521f4c336a36e6bb2e925d89e0211197f591cf01

  • SSDEEP

    24576:IDg4MROxnFR3VTnhrZlI0AilFEvxHiD0:IDDMij/rZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

e86fb9de8bd84a349c8c22746e22a3a3

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\DataStorage\DataStddforage.exe

  • reconnect_delay

    10000

  • registry_keyname

    DatfghdfaStorages

  • taskscheduler_taskname

    DataStdfhorage

  • watchdog_path

    AppData\DataStoragdse.exe

Targets

    • Target

      a0f4041aee9c0195618c9a4ce20f4e68b4902fba611888287df70ae6134b57e9

    • Size

      914KB

    • MD5

      b9f085290297f38b044db9972812c826

    • SHA1

      496f122b6be87a63b68368ad4cbcad814c342672

    • SHA256

      a0f4041aee9c0195618c9a4ce20f4e68b4902fba611888287df70ae6134b57e9

    • SHA512

      f818d1cc3627e32bf30ee1a2ee6800ba858eaa08a3b5a37e9e7ac4fde545c0c1d71ff062ac9da4392ec53053521f4c336a36e6bb2e925d89e0211197f591cf01

    • SSDEEP

      24576:IDg4MROxnFR3VTnhrZlI0AilFEvxHiD0:IDDMij/rZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks