General

  • Target

    45e4164efb64f0a589a567b3c9f5d41107c5d832729e6a7c50f76746566a4cfa

  • Size

    914KB

  • Sample

    240424-cbdefaea4t

  • MD5

    90d13737114c302721421b0f8dd96fe5

  • SHA1

    1c46d75f27aebd4876d723e8631a6c118d15b4cd

  • SHA256

    45e4164efb64f0a589a567b3c9f5d41107c5d832729e6a7c50f76746566a4cfa

  • SHA512

    613fe282f89113b71a8f971bb462fc7754a99e2a64a337d926090581344002676effb5fc006233d096a1e672d299bf084ba5e7394aa71a34391cbff8c2e63df7

  • SSDEEP

    24576:ehg4MROxnFR3KTnsrZlI0AilFEvxHiMz:ehDMij/rZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

178.20.45.159:7777

Mutex

cebdd72cd8644d1887737526c4a60f8b

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %appdata%\Discord\Discord.exe

  • reconnect_delay

    10000

  • registry_keyname

    Update

  • taskscheduler_taskname

    Discord

  • watchdog_path

    Temp\Radmin VPN.exe

Targets

    • Target

      45e4164efb64f0a589a567b3c9f5d41107c5d832729e6a7c50f76746566a4cfa

    • Size

      914KB

    • MD5

      90d13737114c302721421b0f8dd96fe5

    • SHA1

      1c46d75f27aebd4876d723e8631a6c118d15b4cd

    • SHA256

      45e4164efb64f0a589a567b3c9f5d41107c5d832729e6a7c50f76746566a4cfa

    • SHA512

      613fe282f89113b71a8f971bb462fc7754a99e2a64a337d926090581344002676effb5fc006233d096a1e672d299bf084ba5e7394aa71a34391cbff8c2e63df7

    • SSDEEP

      24576:ehg4MROxnFR3KTnsrZlI0AilFEvxHiMz:ehDMij/rZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks