General

  • Target

    wertq.exe

  • Size

    6.0MB

  • Sample

    240421-ljcybagd9t

  • MD5

    ce1e11ea8a77097985e87d54fe201f13

  • SHA1

    a81adb54081f2e435d87c3bde8b161218eb23289

  • SHA256

    39f2a0b5ac1c38ac460ccb1149c8744b6b944889dd1aa1fa133a429bb74245ea

  • SHA512

    67c809914117f63711280bf7b2cd982c38b6f24bad2cce35f28a9e641df51732163cb1826b690ee5cf63e1618d3359878296f8361709ce43096c80cb64a59f5d

  • SSDEEP

    12288:90XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCKvmOE7Kx9n/XpzCKgg7dG1lFlx:Cvn4MROxnFmUrrcI0AilFEvxHje4QC

Malware Config

Extracted

Family

orcus

C2

s7vety-47274.portmap.host:47274

Mutex

942dcd4d921c4c5fa3b9c9a4823b72dc

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %temp%\Windows Updater\updateclient.exe

  • reconnect_delay

    10000

  • registry_keyname

    WindowsUpdater

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      wertq.exe

    • Size

      6.0MB

    • MD5

      ce1e11ea8a77097985e87d54fe201f13

    • SHA1

      a81adb54081f2e435d87c3bde8b161218eb23289

    • SHA256

      39f2a0b5ac1c38ac460ccb1149c8744b6b944889dd1aa1fa133a429bb74245ea

    • SHA512

      67c809914117f63711280bf7b2cd982c38b6f24bad2cce35f28a9e641df51732163cb1826b690ee5cf63e1618d3359878296f8361709ce43096c80cb64a59f5d

    • SSDEEP

      12288:90XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCKvmOE7Kx9n/XpzCKgg7dG1lFlx:Cvn4MROxnFmUrrcI0AilFEvxHje4QC

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks