General

  • Target

    dae97b2ea1f1e559bf3e43fed669be213b9c834d900698a71ff741cf45c3cd24

  • Size

    2.6MB

  • Sample

    240426-cray9ahc3s

  • MD5

    90f4d34798fde17e84c33d3c9d1f5edd

  • SHA1

    d8bd86b93f1351ccc42931ced8b94bc7e921cf90

  • SHA256

    dae97b2ea1f1e559bf3e43fed669be213b9c834d900698a71ff741cf45c3cd24

  • SHA512

    9c44fafc53ea37ab9dd05383bd269e6b5ff934478229cd7c3c54e6dbb5e792ee9308310fab9f0af9ca1623c3994ba875cf106e9c219a90a716e07efe22a158a8

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxo:Hh+ZkldoPKiYdqd6w

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      dae97b2ea1f1e559bf3e43fed669be213b9c834d900698a71ff741cf45c3cd24

    • Size

      2.6MB

    • MD5

      90f4d34798fde17e84c33d3c9d1f5edd

    • SHA1

      d8bd86b93f1351ccc42931ced8b94bc7e921cf90

    • SHA256

      dae97b2ea1f1e559bf3e43fed669be213b9c834d900698a71ff741cf45c3cd24

    • SHA512

      9c44fafc53ea37ab9dd05383bd269e6b5ff934478229cd7c3c54e6dbb5e792ee9308310fab9f0af9ca1623c3994ba875cf106e9c219a90a716e07efe22a158a8

    • SSDEEP

      24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxo:Hh+ZkldoPKiYdqd6w

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks