General
-
Target
297715d7a1db600f1f38b5ddd1bebfda861a57635bab319a879a143da0e9e281
-
Size
3.0MB
-
Sample
240427-bsnfasga75
-
MD5
af71685a6d32a679719b2efb9777d873
-
SHA1
a7360e648e95b9f627ef2fccd37db1b1c7599f9d
-
SHA256
297715d7a1db600f1f38b5ddd1bebfda861a57635bab319a879a143da0e9e281
-
SHA512
60b49f9952f5cacb924d13254bfe8c281320b4da52b3571978fac1f59894c30a89856e89afac4e5d2d7711825e62dcafda892af9c165c430143e23bda5d5e708
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
297715d7a1db600f1f38b5ddd1bebfda861a57635bab319a879a143da0e9e281.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
297715d7a1db600f1f38b5ddd1bebfda861a57635bab319a879a143da0e9e281.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
orcus
LunoClient
31.44.184.52:64770
sudo_xa9u5odc71f8ziw6ymhtgmgmvfhts0pn
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\servercdn\ExLoader.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
297715d7a1db600f1f38b5ddd1bebfda861a57635bab319a879a143da0e9e281
-
Size
3.0MB
-
MD5
af71685a6d32a679719b2efb9777d873
-
SHA1
a7360e648e95b9f627ef2fccd37db1b1c7599f9d
-
SHA256
297715d7a1db600f1f38b5ddd1bebfda861a57635bab319a879a143da0e9e281
-
SHA512
60b49f9952f5cacb924d13254bfe8c281320b4da52b3571978fac1f59894c30a89856e89afac4e5d2d7711825e62dcafda892af9c165c430143e23bda5d5e708
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-