General

  • Target

    b7bd2685ece8533e4f82ad2c7f60fe015989060675b496c29caa5b555bcf7842

  • Size

    2.6MB

  • Sample

    240422-be7a9adc79

  • MD5

    379690b130958e7118850a5da1a08194

  • SHA1

    fe9e7799e946e78765d7e7189e9e98f7645d2cd2

  • SHA256

    b7bd2685ece8533e4f82ad2c7f60fe015989060675b496c29caa5b555bcf7842

  • SHA512

    e02b640607bf163434d81cd7f006b5e31a3597ee948db211f0df6373f59234f8e04afc8d04854ac2634766ede2b13c2d78a12cfecb8655f2877cc2d2dca8b29b

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxu:Hh+ZkldoPKiYdqd6m

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      b7bd2685ece8533e4f82ad2c7f60fe015989060675b496c29caa5b555bcf7842

    • Size

      2.6MB

    • MD5

      379690b130958e7118850a5da1a08194

    • SHA1

      fe9e7799e946e78765d7e7189e9e98f7645d2cd2

    • SHA256

      b7bd2685ece8533e4f82ad2c7f60fe015989060675b496c29caa5b555bcf7842

    • SHA512

      e02b640607bf163434d81cd7f006b5e31a3597ee948db211f0df6373f59234f8e04afc8d04854ac2634766ede2b13c2d78a12cfecb8655f2877cc2d2dca8b29b

    • SSDEEP

      24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxu:Hh+ZkldoPKiYdqd6m

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks