General

  • Target

    6a4c7f153db18e3e1436fc7d95608de8_JaffaCakes118

  • Size

    905KB

  • Sample

    240523-j2gccaad4y

  • MD5

    6a4c7f153db18e3e1436fc7d95608de8

  • SHA1

    5c0a97fbeb4e462d4317da91f0899005f8aae5e8

  • SHA256

    e36f88aaa4c8dde85f5b5523a5cc27e5e280663cf90f4365f2870d54b4d52fd8

  • SHA512

    dce2d18ef0bb818c18d1a25507f8632be13941df065ed3b754cd8017c8f60ffee390d00936304447cd5996daea5ad205ab95ebd5efa3223febecc7cb030b94f7

  • SSDEEP

    24576:HIJu4MROxnFEptJS4rrcI0AilFEvxHPZwooH:H6MiCTS4rrcI0AilFEvxHPZ

Malware Config

Extracted

Family

orcus

C2

eta.ne.virus.ne.trogaj.mena.kstati.putinso.site:1604

Mutex

a8eb49efd6574c7c9e16af35ceef1888

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %appdata%\regedit.exe

  • reconnect_delay

    10000

  • registry_keyname

    Disc0rd

  • taskscheduler_taskname

    Overlay

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      6a4c7f153db18e3e1436fc7d95608de8_JaffaCakes118

    • Size

      905KB

    • MD5

      6a4c7f153db18e3e1436fc7d95608de8

    • SHA1

      5c0a97fbeb4e462d4317da91f0899005f8aae5e8

    • SHA256

      e36f88aaa4c8dde85f5b5523a5cc27e5e280663cf90f4365f2870d54b4d52fd8

    • SHA512

      dce2d18ef0bb818c18d1a25507f8632be13941df065ed3b754cd8017c8f60ffee390d00936304447cd5996daea5ad205ab95ebd5efa3223febecc7cb030b94f7

    • SSDEEP

      24576:HIJu4MROxnFEptJS4rrcI0AilFEvxHPZwooH:H6MiCTS4rrcI0AilFEvxHPZ

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks