General

  • Target

    7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac

  • Size

    2.0MB

  • Sample

    240531-b9pdxsah2s

  • MD5

    f1ea89dd8554bb2a263843b1d13710fa

  • SHA1

    347c6eec4c97ff1d55d2a96726b973b6fdcfc13e

  • SHA256

    7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac

  • SHA512

    706209a15e884afdfaa3bfae4321402658bf976ba79ca1180fe8a656beccd6611eeae778a458dc3db0af5ae6ebbec12dc44159a2c01077bc78554d45da58ecc0

  • SSDEEP

    24576:9jb4MROxnFD3+w8XlrrcI0AilFEvxHP8B6Zoo+:9YMiJ+rrcI0AilFEvxHP8

Malware Config

Extracted

Family

orcus

C2

medicine-pushing.gl.at.ply.gg:50488

Mutex

5320e8a576c446318415088a3fab389c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\VMware\VMware Workstation\activate.exe

  • reconnect_delay

    10000

  • registry_keyname

    Activate VMWARE

  • taskscheduler_taskname

    vmware Bridge-Service

  • watchdog_path

    AppData\svchost.exe

Targets

    • Target

      7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac

    • Size

      2.0MB

    • MD5

      f1ea89dd8554bb2a263843b1d13710fa

    • SHA1

      347c6eec4c97ff1d55d2a96726b973b6fdcfc13e

    • SHA256

      7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac

    • SHA512

      706209a15e884afdfaa3bfae4321402658bf976ba79ca1180fe8a656beccd6611eeae778a458dc3db0af5ae6ebbec12dc44159a2c01077bc78554d45da58ecc0

    • SSDEEP

      24576:9jb4MROxnFD3+w8XlrrcI0AilFEvxHP8B6Zoo+:9YMiJ+rrcI0AilFEvxHP8

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks