General
-
Target
BlitzedGrabberV12.zip
-
Size
4.7MB
-
Sample
240505-qqc9wabc31
-
MD5
196d7976e3d2dd0698ddb274d8da8a69
-
SHA1
defd1719f987576bcda818d45d75b82258d2fceb
-
SHA256
96d4c2c87df34d071db50cf45ce15ea36996855a4e390e75d01715c5664bae24
-
SHA512
36ca4fe04767798ecec8ec2a8b5ae65b258e62a11efd5a8fc27d9a5adceb48fca2c630f4cdbc1eefd0d6c50abf06c148de9124f8859798a51cfd72cd22f08e6c
-
SSDEEP
98304:YQ1ds1M7tisl3aLhCYIsKSZI/zfLsMKzEt:b1J3CpIs9ZQzfL/J
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.zip
Resource
win7-20231129-en
Malware Config
Extracted
orcus
209.25.141.181:40489
248d60d8a7114264bce951ca45664b1d
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programdata%\Chrome\chromedriver.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
winlogon.exe
-
watchdog_path
AppData\svchost.exe
Targets
-
-
Target
BlitzedGrabberV12.zip
-
Size
4.7MB
-
MD5
196d7976e3d2dd0698ddb274d8da8a69
-
SHA1
defd1719f987576bcda818d45d75b82258d2fceb
-
SHA256
96d4c2c87df34d071db50cf45ce15ea36996855a4e390e75d01715c5664bae24
-
SHA512
36ca4fe04767798ecec8ec2a8b5ae65b258e62a11efd5a8fc27d9a5adceb48fca2c630f4cdbc1eefd0d6c50abf06c148de9124f8859798a51cfd72cd22f08e6c
-
SSDEEP
98304:YQ1ds1M7tisl3aLhCYIsKSZI/zfLsMKzEt:b1J3CpIs9ZQzfL/J
-
Orcus main payload
-
StormKitty payload
-
Orcurs Rat Executable
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-