General

  • Target

    7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac

  • Size

    2.0MB

  • MD5

    f1ea89dd8554bb2a263843b1d13710fa

  • SHA1

    347c6eec4c97ff1d55d2a96726b973b6fdcfc13e

  • SHA256

    7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac

  • SHA512

    706209a15e884afdfaa3bfae4321402658bf976ba79ca1180fe8a656beccd6611eeae778a458dc3db0af5ae6ebbec12dc44159a2c01077bc78554d45da58ecc0

  • SSDEEP

    24576:9jb4MROxnFD3+w8XlrrcI0AilFEvxHP8B6Zoo+:9YMiJ+rrcI0AilFEvxHP8

Score
10/10

Malware Config

Extracted

Family

orcus

C2

medicine-pushing.gl.at.ply.gg:50488

Mutex

5320e8a576c446318415088a3fab389c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\VMware\VMware Workstation\activate.exe

  • reconnect_delay

    10000

  • registry_keyname

    Activate VMWARE

  • taskscheduler_taskname

    vmware Bridge-Service

  • watchdog_path

    AppData\svchost.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7f47451d8f82f95aa9f106e697b1592aeb41aa22c64b7a36b6899ed909c8aaac
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections