General

  • Target

    28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118

  • Size

    917KB

  • Sample

    240509-d953sagg4y

  • MD5

    28260a8f637d0d6dfdad0461e24eacac

  • SHA1

    14e42641eb6cd50a37fea63bf7c11b69f30eb3a6

  • SHA256

    a58d0d19ebeb7f3ff0ad74eb9606a71a7d3960099ba5de5b295f79dcd4216a2d

  • SHA512

    3a29c8a837f225c64534bd786ae6d935f857fb94b5a9f44ae8e56a3f2d3e6d6175ca0d60f4bc7c5cce441bbb4e49a1ef0ae1334e5ede8e836da7e618a3b2246d

  • SSDEEP

    24576:oBT4MROxnFD3XEsYxrZlI0AilFEvxHi0/:oB0MiJirZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

0.tcp.ngrok.io:10836

Mutex

f3b2c54fefc748608450f2a783561b9b

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\sysfiles\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    OWO

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\wd.exe

Targets

    • Target

      28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118

    • Size

      917KB

    • MD5

      28260a8f637d0d6dfdad0461e24eacac

    • SHA1

      14e42641eb6cd50a37fea63bf7c11b69f30eb3a6

    • SHA256

      a58d0d19ebeb7f3ff0ad74eb9606a71a7d3960099ba5de5b295f79dcd4216a2d

    • SHA512

      3a29c8a837f225c64534bd786ae6d935f857fb94b5a9f44ae8e56a3f2d3e6d6175ca0d60f4bc7c5cce441bbb4e49a1ef0ae1334e5ede8e836da7e618a3b2246d

    • SSDEEP

      24576:oBT4MROxnFD3XEsYxrZlI0AilFEvxHi0/:oB0MiJirZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks