General

  • Target

    a162bade305b431c5f252ce791b4bed66dcc931c0534a8a1716a86db6669350a

  • Size

    1.2MB

  • Sample

    240428-bdnshscg6s

  • MD5

    1d2fdd176a087068af4b31ccc042de70

  • SHA1

    4e5634731cf060632b9a32a00309166045abead1

  • SHA256

    a162bade305b431c5f252ce791b4bed66dcc931c0534a8a1716a86db6669350a

  • SHA512

    ef31a1ddcaa159b16ae55a932ea09f1e1beea19bdfcf74385a7ab734271f165de9d5a74f6bd2b2be8f3c3eed5a4ff28e11b0e43626be7b85cae0f4c9a44eb06f

  • SSDEEP

    24576:/8YK4MROxnFE3JO37rrcI0AilFEvxHPgtoo4m:UgMiuG7rrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

devjeb

C2

192.168.0.102:10134

Mutex

c11f3301d4da4e7188c643ebc345fc8c

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    MSEDGE

  • taskscheduler_taskname

    MSEDGE

  • watchdog_path

    AppData\MSEDGE_DATE.exe

Targets

    • Target

      a162bade305b431c5f252ce791b4bed66dcc931c0534a8a1716a86db6669350a

    • Size

      1.2MB

    • MD5

      1d2fdd176a087068af4b31ccc042de70

    • SHA1

      4e5634731cf060632b9a32a00309166045abead1

    • SHA256

      a162bade305b431c5f252ce791b4bed66dcc931c0534a8a1716a86db6669350a

    • SHA512

      ef31a1ddcaa159b16ae55a932ea09f1e1beea19bdfcf74385a7ab734271f165de9d5a74f6bd2b2be8f3c3eed5a4ff28e11b0e43626be7b85cae0f4c9a44eb06f

    • SSDEEP

      24576:/8YK4MROxnFE3JO37rrcI0AilFEvxHPgtoo4m:UgMiuG7rrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks