General
-
Target
4fcbf46efbab3f0791cb8eae7dd08ca0_JaffaCakes118
-
Size
579KB
-
Sample
240517-ppzaaahe45
-
MD5
4fcbf46efbab3f0791cb8eae7dd08ca0
-
SHA1
b26eb48d5e78ad50c685ab5ac9987519a41226a8
-
SHA256
5ff2bbbfccb553464ebccb5fe8293607d31453a41fc14cf023378b3d503baf0d
-
SHA512
abe59ec4c55ee1ea2b616ae98aa995b00507bc66088d7da11103f61d49ad0e2bf4cfb88ee58032b03eec121e3469ab32a12fc5dbadb4f924e3cce1e1bffde750
-
SSDEEP
12288:1kMGmB7qxE5RBtfpwJCf83dIh6VwU1d5hanJ0RVjumX:inmBuxE7fpwddBCEcJ0rBX
Behavioral task
behavioral1
Sample
cheat injector.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cheat injector.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
orcus
malakismeno
kmoukoun.ddns.net:4782
aa70db3aada74bea8cfc3e82bc9f4fa1
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Windows Audio
-
taskscheduler_taskname
svchost
-
watchdog_path
AppData\windows.exe
Targets
-
-
Target
cheat injector.exe
-
Size
920KB
-
MD5
15dda33200e2f5f0efa90e39c6d97391
-
SHA1
3be8d9f8335f760e5777b06b1d90a18456c14a43
-
SHA256
e6b521e4a46a242837679a4c2fffe77ec0a7c096df4d0fdd52bde358e7871751
-
SHA512
c4a926fe9920e91015c7880dcf78db6b67928a56ba8bb5e271178a4c2647bc640da9a330eaec5f13542b0d5dfe0246c2c2d10db1023cdb37ce32085e021fd6a8
-
SSDEEP
24576:mtY4MROxnFZ3xkTZhrZlI0AilFEvxHito:mt7Mi7CrZlI0AilFEvxHi
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-