General

  • Target

    d9b37247cd2a319a02ca98c3ba5840ee6301762ffe42d8120b1b9438d98842bb

  • Size

    7.9MB

  • Sample

    240531-ebbxqafb33

  • MD5

    40d8affb6ac665933393a3d59dfe75b1

  • SHA1

    c82b3e41bba68330f8e84afafec7ba3e32a31d30

  • SHA256

    d9b37247cd2a319a02ca98c3ba5840ee6301762ffe42d8120b1b9438d98842bb

  • SHA512

    4ce3b870b455ffaa6913c196ffa7c683b7aedb42effa00b0bedd6f24a3143e710e88a970fd8ef22eff1ebe4052de0c75834dda643045c61d4606964c3345b5d1

  • SSDEEP

    49152:d6uqqS//zu5mxqLMl3MGbsxHochKABPIF+2Rq+2eysxZjIwKqxlv:

Malware Config

Targets

    • Target

      d9b37247cd2a319a02ca98c3ba5840ee6301762ffe42d8120b1b9438d98842bb

    • Size

      7.9MB

    • MD5

      40d8affb6ac665933393a3d59dfe75b1

    • SHA1

      c82b3e41bba68330f8e84afafec7ba3e32a31d30

    • SHA256

      d9b37247cd2a319a02ca98c3ba5840ee6301762ffe42d8120b1b9438d98842bb

    • SHA512

      4ce3b870b455ffaa6913c196ffa7c683b7aedb42effa00b0bedd6f24a3143e710e88a970fd8ef22eff1ebe4052de0c75834dda643045c61d4606964c3345b5d1

    • SSDEEP

      49152:d6uqqS//zu5mxqLMl3MGbsxHochKABPIF+2Rq+2eysxZjIwKqxlv:

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Detects executables manipulated with Fody

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks