General
-
Target
838db8ab2f771d8012c8a0d9a0a87b10_JaffaCakes118
-
Size
1.5MB
-
Sample
240530-j8cbzacf69
-
MD5
838db8ab2f771d8012c8a0d9a0a87b10
-
SHA1
1c1fa9619a53a6931647ff0df64fe15d9902ba83
-
SHA256
3fe007ad53213fb08ef69264b0a7cdb871eec48fc7b34de8934293bbb752aaa3
-
SHA512
fb52f77b774e0ef4ccea2fe2440e10d2bce218c6df28154d601d8a44fab404b030124655d8b76218ccdf75f2564a0e7589f20c6274580f9b3b01dbb943162d0e
-
SSDEEP
24576:RoK5MMv0TUoJVRIfLNV8LAv5vkVQ0BL3vrlsW+/O9RIOkT:RoAMM6JVRMV1vhOrrln7g
Static task
static1
Behavioral task
behavioral1
Sample
838db8ab2f771d8012c8a0d9a0a87b10_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
orcus
DESK-100618
poulty55.chickenkiller.com:9030
a386a045d9c842428c74de4ed9645fe9
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10002
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
838db8ab2f771d8012c8a0d9a0a87b10_JaffaCakes118
-
Size
1.5MB
-
MD5
838db8ab2f771d8012c8a0d9a0a87b10
-
SHA1
1c1fa9619a53a6931647ff0df64fe15d9902ba83
-
SHA256
3fe007ad53213fb08ef69264b0a7cdb871eec48fc7b34de8934293bbb752aaa3
-
SHA512
fb52f77b774e0ef4ccea2fe2440e10d2bce218c6df28154d601d8a44fab404b030124655d8b76218ccdf75f2564a0e7589f20c6274580f9b3b01dbb943162d0e
-
SSDEEP
24576:RoK5MMv0TUoJVRIfLNV8LAv5vkVQ0BL3vrlsW+/O9RIOkT:RoAMM6JVRMV1vhOrrln7g
-
Detect ZGRat V2
-
Orcurs Rat Executable
-
Drops startup file
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-