General

  • Target

    f9befc0b9bc17705651b9f20d9315b6b722732343cc76501dbf87e4adab717f7

  • Size

    919KB

  • Sample

    240425-bnbkyacf87

  • MD5

    a6a30137a8aa31f94926b3a92cccbc73

  • SHA1

    adcf3da9a7eac6c4619ef0fecc5e61b9f8fe352e

  • SHA256

    f9befc0b9bc17705651b9f20d9315b6b722732343cc76501dbf87e4adab717f7

  • SHA512

    66c30ffa435d1b5252aa8b25610adb875322fbc9d9a2143eb355c71f9bde84e2326b893eef87ffbd5221b7b8b21ef389d153940b130cf742fb01e63b084387ef

  • SSDEEP

    24576:uUU4MROxnFH3QRM4orrcI0AilFEvxHPsUCoor:uiMihQlorrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

c1d2109277964aabaddadf549be4e041

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      f9befc0b9bc17705651b9f20d9315b6b722732343cc76501dbf87e4adab717f7

    • Size

      919KB

    • MD5

      a6a30137a8aa31f94926b3a92cccbc73

    • SHA1

      adcf3da9a7eac6c4619ef0fecc5e61b9f8fe352e

    • SHA256

      f9befc0b9bc17705651b9f20d9315b6b722732343cc76501dbf87e4adab717f7

    • SHA512

      66c30ffa435d1b5252aa8b25610adb875322fbc9d9a2143eb355c71f9bde84e2326b893eef87ffbd5221b7b8b21ef389d153940b130cf742fb01e63b084387ef

    • SSDEEP

      24576:uUU4MROxnFH3QRM4orrcI0AilFEvxHPsUCoor:uiMihQlorrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks