General
-
Target
c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030
-
Size
3.0MB
-
Sample
240602-bpjypsdh5t
-
MD5
0a8741bf24a517d75d1bffe859652340
-
SHA1
2c46106097de66329b81488c147fd9fdf6d77eef
-
SHA256
c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030
-
SHA512
e65156ddfa0fcd655456264560a4595e420e5d5e51e2cbb1a891a00b2c5bff0a6544668a42949e607bf6350f617029a6fa380542010a71d7c007c6c2b53547b1
-
SSDEEP
49152:yUr37p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpXu/nRFfjI7L0qb:yKHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030.exe
Resource
win7-20231129-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:64770
sudo_hal858ujvt6et79hqbrtvi32dxbc2c2c
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
C:\Users\rc\AppData\Roaming\.minecraft\TlauncherUninstall.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030
-
Size
3.0MB
-
MD5
0a8741bf24a517d75d1bffe859652340
-
SHA1
2c46106097de66329b81488c147fd9fdf6d77eef
-
SHA256
c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030
-
SHA512
e65156ddfa0fcd655456264560a4595e420e5d5e51e2cbb1a891a00b2c5bff0a6544668a42949e607bf6350f617029a6fa380542010a71d7c007c6c2b53547b1
-
SSDEEP
49152:yUr37p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpXu/nRFfjI7L0qb:yKHTPJg8z1mKnypSbRxo9JCm
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-