General
-
Target
37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9
-
Size
919KB
-
Sample
240507-bf3pfsbe2z
-
MD5
204f1d4f575a99222c38d450ee5cf26c
-
SHA1
69e81292830da574d97701a9e6307a6250ab5939
-
SHA256
37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9
-
SHA512
3d996702f465d982af4088e67b6d32b05dc8398df7260741c99c2d3e4ed76960489190d7ce7bb0556745846c603048bc37e749102587d8b9318a44d90b53d030
-
SSDEEP
24576:hAi4MROxnFH3/IBM4GrrcI0AilFEvxHPJooN:hgMih/eGrrcI0AilFEvxHP
Behavioral task
behavioral1
Sample
37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
orcus
try-belly.gl.at.ply.gg:44885
bb6b3779ef7e4e68a7044486f13b5128
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Windows PowerShell\powershell.exe
-
reconnect_delay
10000
-
registry_keyname
Windows Update
-
taskscheduler_taskname
Windows Update
-
watchdog_path
AppData\RuntimeBroker.exe
Targets
-
-
Target
37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9
-
Size
919KB
-
MD5
204f1d4f575a99222c38d450ee5cf26c
-
SHA1
69e81292830da574d97701a9e6307a6250ab5939
-
SHA256
37808cdc98d612255b83f097eb38ad19bc96b5c6d4b24eeb3ae0aa19708f43a9
-
SHA512
3d996702f465d982af4088e67b6d32b05dc8398df7260741c99c2d3e4ed76960489190d7ce7bb0556745846c603048bc37e749102587d8b9318a44d90b53d030
-
SSDEEP
24576:hAi4MROxnFH3/IBM4GrrcI0AilFEvxHPJooN:hgMih/eGrrcI0AilFEvxHP
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-