General

  • Target

    5bc5314a4db8905f3275d7d1f1a9b771_JaffaCakes118

  • Size

    920KB

  • Sample

    240519-178r8adc44

  • MD5

    5bc5314a4db8905f3275d7d1f1a9b771

  • SHA1

    bd06343900d8cce2dab8ce275e57c6b1e25e0200

  • SHA256

    d8a08d1567bd0fdce1a8860052e2fa652cbf3426e6b3009443bebfc5076f4518

  • SHA512

    5e8f82879ddf7e60496007ff930f3d0422b49ab7c29c26c46fb2394a2ec6984f9b2fe6c7dcf8a5186d9e65f72bfd0c158c66720c43305ff533494c2170528339

  • SSDEEP

    24576:lNL34MROxnFZ3SRM4crrcI0AilFEvxHPyMYoo5:lWMi7SlcrrcI0AilFEvxHP5

Malware Config

Extracted

Family

orcus

C2

195.154.226.17:1338

Mutex

570596513cd24deab77fe8be276acda8

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\v4rt3x.exe

Targets

    • Target

      5bc5314a4db8905f3275d7d1f1a9b771_JaffaCakes118

    • Size

      920KB

    • MD5

      5bc5314a4db8905f3275d7d1f1a9b771

    • SHA1

      bd06343900d8cce2dab8ce275e57c6b1e25e0200

    • SHA256

      d8a08d1567bd0fdce1a8860052e2fa652cbf3426e6b3009443bebfc5076f4518

    • SHA512

      5e8f82879ddf7e60496007ff930f3d0422b49ab7c29c26c46fb2394a2ec6984f9b2fe6c7dcf8a5186d9e65f72bfd0c158c66720c43305ff533494c2170528339

    • SSDEEP

      24576:lNL34MROxnFZ3SRM4crrcI0AilFEvxHPyMYoo5:lWMi7SlcrrcI0AilFEvxHP5

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks