General

  • Target

    52ba75535ee12f1940514bd049189bb2907e31560a3e4490268c6471dc38b2de

  • Size

    915KB

  • Sample

    240426-bsqknagh3y

  • MD5

    3f5d553fc7fd6cf287bcfacce9ecbe7d

  • SHA1

    2b9fa4798907387094963d984f9539426cda6745

  • SHA256

    52ba75535ee12f1940514bd049189bb2907e31560a3e4490268c6471dc38b2de

  • SHA512

    a2b857e8343b69d2c7f3b78d64333b3eae41efc5a5180f636df08f9f60905fbbebf3a43a9deb75c866594390763fa66934cc330e72e54bfe90d3b421bc9afe10

  • SSDEEP

    24576:veC4MROxnFD3tw8XlrrcI0AilFEvxHP9oo3:veMiJ/rrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

1

C2

95.165.149.124:4444

Mutex

4977318a1cdb43478f26a78718953817

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Microsoft\AudioHD\Driver\AudioHD.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Microsoft AudioHD

  • watchdog_path

    AppData\AudioHD.exe

Targets

    • Target

      52ba75535ee12f1940514bd049189bb2907e31560a3e4490268c6471dc38b2de

    • Size

      915KB

    • MD5

      3f5d553fc7fd6cf287bcfacce9ecbe7d

    • SHA1

      2b9fa4798907387094963d984f9539426cda6745

    • SHA256

      52ba75535ee12f1940514bd049189bb2907e31560a3e4490268c6471dc38b2de

    • SHA512

      a2b857e8343b69d2c7f3b78d64333b3eae41efc5a5180f636df08f9f60905fbbebf3a43a9deb75c866594390763fa66934cc330e72e54bfe90d3b421bc9afe10

    • SSDEEP

      24576:veC4MROxnFD3tw8XlrrcI0AilFEvxHP9oo3:veMiJ/rrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks