Resubmissions

03-05-2024 23:43

240503-3q1fmagf9w 10

General

  • Target

    http://89.23.99.47:7777/

  • Sample

    240503-3q1fmagf9w

Malware Config

Extracted

Family

orcus

Botnet

test

C2

31.44.184.52:29613

Mutex

sudo_0m133t8qmo0n91x8rat4ox0arlnn9ww5

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\longpollbaserequest\pollhttp.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      http://89.23.99.47:7777/

    • Detect ZGRat V1

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Orcurs Rat Executable

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks