General

  • Target

    Byfron Ultimatum.exe

  • Size

    911KB

  • Sample

    240521-thaqkabb86

  • MD5

    4cbff1c9dfc88532ca3a71e9ee75e699

  • SHA1

    c277d547a809531bc73b5b0f18d48c6ebc109709

  • SHA256

    0eb38d225cb51a781634e4285262599b87c5829c63f6bce50062db64ef8cf39c

  • SHA512

    b5baba36db1f3a88c0644adf4df723b61059ad0c68b3b657b753ab6e01db85948c6c22b3dab649c828da76cf6711303f9ac6853663b28575974ec6af63a5a3cd

  • SSDEEP

    24576:gk84MROxnFj3wBukhrrcI0AilFEvxHPJooCp:giMi1ZqrrcI0AilFEvxHPK

Malware Config

Extracted

Family

orcus

Botnet

Niggers

C2

should-nutritional.gl.at.ply.gg:22817

Mutex

721eca8ad3474c2ab1c30e76379e1f7d

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\temp\conhost.exe

  • reconnect_delay

    10000

  • registry_keyname

    Microsoft

  • taskscheduler_taskname

    winhost

  • watchdog_path

    Temp\wininit.exe

Targets

    • Target

      Byfron Ultimatum.exe

    • Size

      911KB

    • MD5

      4cbff1c9dfc88532ca3a71e9ee75e699

    • SHA1

      c277d547a809531bc73b5b0f18d48c6ebc109709

    • SHA256

      0eb38d225cb51a781634e4285262599b87c5829c63f6bce50062db64ef8cf39c

    • SHA512

      b5baba36db1f3a88c0644adf4df723b61059ad0c68b3b657b753ab6e01db85948c6c22b3dab649c828da76cf6711303f9ac6853663b28575974ec6af63a5a3cd

    • SSDEEP

      24576:gk84MROxnFj3wBukhrrcI0AilFEvxHPJooCp:giMi1ZqrrcI0AilFEvxHPK

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks