General
-
Target
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda
-
Size
2.6MB
-
Sample
240423-cmbpzsbe39
-
MD5
a8f31863b2267620ae61e37c4d5fb26e
-
SHA1
2c8c86b736da9a861eef2921a6d20a3ae2070f9e
-
SHA256
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda
-
SHA512
d92d90ce97bdaf0f6868b95236ac4a9050f498e53afed168d69ba0bb057c0f662ad9e783f9bf523f4d6cc4bfb0c308fec82e80e5ebac3b7c7a2c105aaf32cb5d
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxr:Hh+ZkldoPKiYdqd6z
Static task
static1
Behavioral task
behavioral1
Sample
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe
Resource
win7-20240221-en
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda
-
Size
2.6MB
-
MD5
a8f31863b2267620ae61e37c4d5fb26e
-
SHA1
2c8c86b736da9a861eef2921a6d20a3ae2070f9e
-
SHA256
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda
-
SHA512
d92d90ce97bdaf0f6868b95236ac4a9050f498e53afed168d69ba0bb057c0f662ad9e783f9bf523f4d6cc4bfb0c308fec82e80e5ebac3b7c7a2c105aaf32cb5d
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxr:Hh+ZkldoPKiYdqd6z
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-