General
-
Target
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118
-
Size
917KB
-
Sample
240509-d953sagg4y
-
MD5
28260a8f637d0d6dfdad0461e24eacac
-
SHA1
14e42641eb6cd50a37fea63bf7c11b69f30eb3a6
-
SHA256
a58d0d19ebeb7f3ff0ad74eb9606a71a7d3960099ba5de5b295f79dcd4216a2d
-
SHA512
3a29c8a837f225c64534bd786ae6d935f857fb94b5a9f44ae8e56a3f2d3e6d6175ca0d60f4bc7c5cce441bbb4e49a1ef0ae1334e5ede8e836da7e618a3b2246d
-
SSDEEP
24576:oBT4MROxnFD3XEsYxrZlI0AilFEvxHi0/:oB0MiJirZlI0AilFEvxHi
Behavioral task
behavioral1
Sample
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
orcus
0.tcp.ngrok.io:10836
f3b2c54fefc748608450f2a783561b9b
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\sysfiles\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
OWO
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\wd.exe
Targets
-
-
Target
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118
-
Size
917KB
-
MD5
28260a8f637d0d6dfdad0461e24eacac
-
SHA1
14e42641eb6cd50a37fea63bf7c11b69f30eb3a6
-
SHA256
a58d0d19ebeb7f3ff0ad74eb9606a71a7d3960099ba5de5b295f79dcd4216a2d
-
SHA512
3a29c8a837f225c64534bd786ae6d935f857fb94b5a9f44ae8e56a3f2d3e6d6175ca0d60f4bc7c5cce441bbb4e49a1ef0ae1334e5ede8e836da7e618a3b2246d
-
SSDEEP
24576:oBT4MROxnFD3XEsYxrZlI0AilFEvxHi0/:oB0MiJirZlI0AilFEvxHi
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-