General

  • Target

    fbcf5a593764f30ac5d20579ff73ee0d09a656d5451417d6d85bd8969a62eb50

  • Size

    926KB

  • Sample

    240528-bk29gsac39

  • MD5

    89188042a998ec22a6c73fe6dacffaac

  • SHA1

    17bb8265b42ee2965af1e4d006d3b560f5d8850c

  • SHA256

    fbcf5a593764f30ac5d20579ff73ee0d09a656d5451417d6d85bd8969a62eb50

  • SHA512

    838d3bd28ff52e93934c22fb7962d00e0b6f342de72b29b3baef7edef81bd9116393113339153c5c6642c2e1bc9d788af1536d9dd95f24360a5177a6a41c9a72

  • SSDEEP

    24576:VCC4MROxnFE3bO3YrrcI0AilFEvxHP7PooC:VKMiuoYrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

live-promotions.gl.at.ply.gg:51701

Mutex

8308403d2e84407bbd17db2f8cf97418

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      fbcf5a593764f30ac5d20579ff73ee0d09a656d5451417d6d85bd8969a62eb50

    • Size

      926KB

    • MD5

      89188042a998ec22a6c73fe6dacffaac

    • SHA1

      17bb8265b42ee2965af1e4d006d3b560f5d8850c

    • SHA256

      fbcf5a593764f30ac5d20579ff73ee0d09a656d5451417d6d85bd8969a62eb50

    • SHA512

      838d3bd28ff52e93934c22fb7962d00e0b6f342de72b29b3baef7edef81bd9116393113339153c5c6642c2e1bc9d788af1536d9dd95f24360a5177a6a41c9a72

    • SSDEEP

      24576:VCC4MROxnFE3bO3YrrcI0AilFEvxHP7PooC:VKMiuoYrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks