General

  • Target

    705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118

  • Size

    905KB

  • Sample

    240525-bcrg1sgh6x

  • MD5

    705e236d9741eab7b6bd7c00cc31396d

  • SHA1

    b74b875ca24cf47706dd3c9d143a667cf3b5578f

  • SHA256

    b024801dc39508b26f463fdd002e4daaf3c3e45870c664f75ab1a98e42cb1d2f

  • SHA512

    05efc5d585c86d4c3eff76313e8fd24647458207f2b9885bcea4852db8c4daf928e53468b990c6a77bb624939669a87672a42d0a50737880e1af5188d9c8a4c3

  • SSDEEP

    12288:noHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoawvjKgRRAErZNrI0AilFEvxk:Leu4MROxnFDgHjrZlI0AilFEvxHiSVu

Malware Config

Extracted

Family

orcus

C2

s1.kekw.tk:1337

Mutex

ec048ad7fb2544ce8ce0e245ce5e3c05

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %allusersprofile%\Microsoft\Windows\time.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118

    • Size

      905KB

    • MD5

      705e236d9741eab7b6bd7c00cc31396d

    • SHA1

      b74b875ca24cf47706dd3c9d143a667cf3b5578f

    • SHA256

      b024801dc39508b26f463fdd002e4daaf3c3e45870c664f75ab1a98e42cb1d2f

    • SHA512

      05efc5d585c86d4c3eff76313e8fd24647458207f2b9885bcea4852db8c4daf928e53468b990c6a77bb624939669a87672a42d0a50737880e1af5188d9c8a4c3

    • SSDEEP

      12288:noHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoawvjKgRRAErZNrI0AilFEvxk:Leu4MROxnFDgHjrZlI0AilFEvxHiSVu

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks