General
-
Target
9ebfa684485369043b5c5c06972a96e592c2b9a4a276361ca0557da90a15f60e
-
Size
2.0MB
-
Sample
240520-bgen1scg6y
-
MD5
cfbef968f6849584b09d80e9400831fb
-
SHA1
55dcd9883812008506b97913b357086bf83b35f2
-
SHA256
9ebfa684485369043b5c5c06972a96e592c2b9a4a276361ca0557da90a15f60e
-
SHA512
f36b932f985a88101c173b33c68653c106dc34deb79653bac29cea8d48afb78570f1627a7259621a5dbaea5a69b4259d18a74f6564aaf5d272e16a9911359836
-
SSDEEP
12288:55STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawhmg6vgWrOrZNrI0AilFEvxHvBMI:fhg4MROxnFc645rZlI0AilFEvxHi70
Behavioral task
behavioral1
Sample
9ebfa684485369043b5c5c06972a96e592c2b9a4a276361ca0557da90a15f60e.exe
Resource
win7-20240221-en
Malware Config
Extracted
orcus
185.154.14.217:10134
8f9ad032680b48e4921e3dead6b0b2ce
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%appdata%\Java\javaUpdate.exe
-
reconnect_delay
10000
-
registry_keyname
JavaUpate
-
taskscheduler_taskname
JavaUpate
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
9ebfa684485369043b5c5c06972a96e592c2b9a4a276361ca0557da90a15f60e
-
Size
2.0MB
-
MD5
cfbef968f6849584b09d80e9400831fb
-
SHA1
55dcd9883812008506b97913b357086bf83b35f2
-
SHA256
9ebfa684485369043b5c5c06972a96e592c2b9a4a276361ca0557da90a15f60e
-
SHA512
f36b932f985a88101c173b33c68653c106dc34deb79653bac29cea8d48afb78570f1627a7259621a5dbaea5a69b4259d18a74f6564aaf5d272e16a9911359836
-
SSDEEP
12288:55STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawhmg6vgWrOrZNrI0AilFEvxHvBMI:fhg4MROxnFc645rZlI0AilFEvxHi70
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-