General
-
Target
71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4
-
Size
5.0MB
-
Sample
240530-be8t3shf52
-
MD5
ecb897fbec48d393966818f238a3a08c
-
SHA1
b1a79d839564bef6ceb8aa2812fa1be1d659c3b5
-
SHA256
71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4
-
SHA512
be629cb22b3a35414ca855fcd2c4c5c70599bec089f2c5ceb2a48d0a05ffbbbf393c10428a2e1e3e810caee9ff2233f5d244afe5e0c1afb5aa3dc5ee3690da4f
-
SSDEEP
24576:EAi4MROxnFVptJSerrcI0AilFEvxHPaooAZ:EgMihTSerrcI0AilFEvxHPn
Behavioral task
behavioral1
Sample
71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
orcus
172.30.186.213:10134
d03c8bb7fd3145ff909313b6f02ad456
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Windows
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4
-
Size
5.0MB
-
MD5
ecb897fbec48d393966818f238a3a08c
-
SHA1
b1a79d839564bef6ceb8aa2812fa1be1d659c3b5
-
SHA256
71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4
-
SHA512
be629cb22b3a35414ca855fcd2c4c5c70599bec089f2c5ceb2a48d0a05ffbbbf393c10428a2e1e3e810caee9ff2233f5d244afe5e0c1afb5aa3dc5ee3690da4f
-
SSDEEP
24576:EAi4MROxnFVptJSerrcI0AilFEvxHPaooAZ:EgMihTSerrcI0AilFEvxHPn
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-