General

  • Target

    37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9

  • Size

    919KB

  • Sample

    240507-bf3pfsbe2z

  • MD5

    204f1d4f575a99222c38d450ee5cf26c

  • SHA1

    69e81292830da574d97701a9e6307a6250ab5939

  • SHA256

    37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9

  • SHA512

    3d996702f465d982af4088e67b6d32b05dc8398df7260741c99c2d3e4ed76960489190d7ce7bb0556745846c603048bc37e749102587d8b9318a44d90b53d030

  • SSDEEP

    24576:hAi4MROxnFH3/IBM4GrrcI0AilFEvxHPJooN:hgMih/eGrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

try-belly.gl.at.ply.gg:44885

Mutex

bb6b3779ef7e4e68a7044486f13b5128

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Windows PowerShell\powershell.exe

  • reconnect_delay

    10000

  • registry_keyname

    Windows Update

  • taskscheduler_taskname

    Windows Update

  • watchdog_path

    AppData\RuntimeBroker.exe

Targets

    • Target

      37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9

    • Size

      919KB

    • MD5

      204f1d4f575a99222c38d450ee5cf26c

    • SHA1

      69e81292830da574d97701a9e6307a6250ab5939

    • SHA256

      37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9

    • SHA512

      3d996702f465d982af4088e67b6d32b05dc8398df7260741c99c2d3e4ed76960489190d7ce7bb0556745846c603048bc37e749102587d8b9318a44d90b53d030

    • SSDEEP

      24576:hAi4MROxnFH3/IBM4GrrcI0AilFEvxHPJooN:hgMih/eGrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks