General

  • Target

    3b1e335dac241e714b475cfeb2b5568c39dbd3fd660c8e2baded23e84246e8a1

  • Size

    923KB

  • Sample

    240522-bq19dafg94

  • MD5

    90aad458c97b7381972efdfb0b02c57e

  • SHA1

    069220f73ef14d30816612450549ccd1faaca135

  • SHA256

    3b1e335dac241e714b475cfeb2b5568c39dbd3fd660c8e2baded23e84246e8a1

  • SHA512

    d6858685120dffac208cb8b7b90be0a3ade20984a9a4fb372ab4515f0f9fd57f52aabc630d272200294e35143bda3cfbb8b722c03852ea170493943c72ac1714

  • SSDEEP

    12288:WipkuIqoE8Byn6497dG1lFlWcYT70pxnnaaoawGRVcTqSA+9rZNrI0AilFEvxHvd:6mV4MROxnFPLqrZlI0AilFEvxHiZ7u

Malware Config

Extracted

Family

orcus

C2

92.240.245.161:8010

Mutex

c208a879463248e19a922162bedb3564

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      3b1e335dac241e714b475cfeb2b5568c39dbd3fd660c8e2baded23e84246e8a1

    • Size

      923KB

    • MD5

      90aad458c97b7381972efdfb0b02c57e

    • SHA1

      069220f73ef14d30816612450549ccd1faaca135

    • SHA256

      3b1e335dac241e714b475cfeb2b5568c39dbd3fd660c8e2baded23e84246e8a1

    • SHA512

      d6858685120dffac208cb8b7b90be0a3ade20984a9a4fb372ab4515f0f9fd57f52aabc630d272200294e35143bda3cfbb8b722c03852ea170493943c72ac1714

    • SSDEEP

      12288:WipkuIqoE8Byn6497dG1lFlWcYT70pxnnaaoawGRVcTqSA+9rZNrI0AilFEvxHvd:6mV4MROxnFPLqrZlI0AilFEvxHiZ7u

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks