General

  • Target

    4fcbf46efbab3f0791cb8eae7dd08ca0_JaffaCakes118

  • Size

    579KB

  • Sample

    240517-ppzaaahe45

  • MD5

    4fcbf46efbab3f0791cb8eae7dd08ca0

  • SHA1

    b26eb48d5e78ad50c685ab5ac9987519a41226a8

  • SHA256

    5ff2bbbfccb553464ebccb5fe8293607d31453a41fc14cf023378b3d503baf0d

  • SHA512

    abe59ec4c55ee1ea2b616ae98aa995b00507bc66088d7da11103f61d49ad0e2bf4cfb88ee58032b03eec121e3469ab32a12fc5dbadb4f924e3cce1e1bffde750

  • SSDEEP

    12288:1kMGmB7qxE5RBtfpwJCf83dIh6VwU1d5hanJ0RVjumX:inmBuxE7fpwddBCEcJ0rBX

Malware Config

Extracted

Family

orcus

Botnet

malakismeno

C2

kmoukoun.ddns.net:4782

Mutex

aa70db3aada74bea8cfc3e82bc9f4fa1

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Windows Audio

  • taskscheduler_taskname

    svchost

  • watchdog_path

    AppData\windows.exe

Targets

    • Target

      cheat injector.exe

    • Size

      920KB

    • MD5

      15dda33200e2f5f0efa90e39c6d97391

    • SHA1

      3be8d9f8335f760e5777b06b1d90a18456c14a43

    • SHA256

      e6b521e4a46a242837679a4c2fffe77ec0a7c096df4d0fdd52bde358e7871751

    • SHA512

      c4a926fe9920e91015c7880dcf78db6b67928a56ba8bb5e271178a4c2647bc640da9a330eaec5f13542b0d5dfe0246c2c2d10db1023cdb37ce32085e021fd6a8

    • SSDEEP

      24576:mtY4MROxnFZ3xkTZhrZlI0AilFEvxHito:mt7Mi7CrZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks