General

  • Target

    467128cff34d0311c71360b284cf0486_JaffaCakes118

  • Size

    906KB

  • Sample

    240515-qy1p5sca3s

  • MD5

    467128cff34d0311c71360b284cf0486

  • SHA1

    50b04b134ddcc8303b12f7b419e663c33c5db7d2

  • SHA256

    47dc5ab7882d6560174747144f9ef09c0b66c2a2e94d56337a0a30acbee34118

  • SHA512

    28c69f129a0aed63f24beeec216828ba0d2c13939d25d52d605ffae9ec427bb39a765bc4bf2ed8fa15535ad9d730cd9ea6e53e0a28b90eb62991fbb3930235d3

  • SSDEEP

    12288:3y50ed4UM7571j87dG1lFlWcYT70pxnnaaoawljKgRRAGrZNrI0AilFEvxHvBMPa:rp44MROxnFhgH5rZlI0AilFEvxHiPzO

Malware Config

Extracted

Family

orcus

Botnet

Group A

C2

kisliycorporait.hopto.org:10134

Mutex

31e1a251228e41c2a660a8dae6e53a62

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\Local\windll.exe

  • reconnect_delay

    10000

  • registry_keyname

    Windows Securty Advice

  • taskscheduler_taskname

    Deintrep

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      467128cff34d0311c71360b284cf0486_JaffaCakes118

    • Size

      906KB

    • MD5

      467128cff34d0311c71360b284cf0486

    • SHA1

      50b04b134ddcc8303b12f7b419e663c33c5db7d2

    • SHA256

      47dc5ab7882d6560174747144f9ef09c0b66c2a2e94d56337a0a30acbee34118

    • SHA512

      28c69f129a0aed63f24beeec216828ba0d2c13939d25d52d605ffae9ec427bb39a765bc4bf2ed8fa15535ad9d730cd9ea6e53e0a28b90eb62991fbb3930235d3

    • SSDEEP

      12288:3y50ed4UM7571j87dG1lFlWcYT70pxnnaaoawljKgRRAGrZNrI0AilFEvxHvBMPa:rp44MROxnFhgH5rZlI0AilFEvxHiPzO

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks