General

  • Target

    71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4

  • Size

    5.0MB

  • Sample

    240530-be8t3shf52

  • MD5

    ecb897fbec48d393966818f238a3a08c

  • SHA1

    b1a79d839564bef6ceb8aa2812fa1be1d659c3b5

  • SHA256

    71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4

  • SHA512

    be629cb22b3a35414ca855fcd2c4c5c70599bec089f2c5ceb2a48d0a05ffbbbf393c10428a2e1e3e810caee9ff2233f5d244afe5e0c1afb5aa3dc5ee3690da4f

  • SSDEEP

    24576:EAi4MROxnFVptJSerrcI0AilFEvxHPaooAZ:EgMihTSerrcI0AilFEvxHPn

Malware Config

Extracted

Family

orcus

C2

172.30.186.213:10134

Mutex

d03c8bb7fd3145ff909313b6f02ad456

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Windows

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4

    • Size

      5.0MB

    • MD5

      ecb897fbec48d393966818f238a3a08c

    • SHA1

      b1a79d839564bef6ceb8aa2812fa1be1d659c3b5

    • SHA256

      71a2ad343ee370d37b0df04d25b6baa6c6c30ca6ed144f160f4d3abd22aa02c4

    • SHA512

      be629cb22b3a35414ca855fcd2c4c5c70599bec089f2c5ceb2a48d0a05ffbbbf393c10428a2e1e3e810caee9ff2233f5d244afe5e0c1afb5aa3dc5ee3690da4f

    • SSDEEP

      24576:EAi4MROxnFVptJSerrcI0AilFEvxHPaooAZ:EgMihTSerrcI0AilFEvxHPn

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks