General

  • Target

    c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030

  • Size

    3.0MB

  • Sample

    240602-bpjypsdh5t

  • MD5

    0a8741bf24a517d75d1bffe859652340

  • SHA1

    2c46106097de66329b81488c147fd9fdf6d77eef

  • SHA256

    c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030

  • SHA512

    e65156ddfa0fcd655456264560a4595e420e5d5e51e2cbb1a891a00b2c5bff0a6544668a42949e607bf6350f617029a6fa380542010a71d7c007c6c2b53547b1

  • SSDEEP

    49152:yUr37p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpXu/nRFfjI7L0qb:yKHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

Новый тег

C2

31.44.184.52:64770

Mutex

sudo_hal858ujvt6et79hqbrtvi32dxbc2c2c

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    C:\Users\rc\AppData\Roaming\.minecraft\TlauncherUninstall.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030

    • Size

      3.0MB

    • MD5

      0a8741bf24a517d75d1bffe859652340

    • SHA1

      2c46106097de66329b81488c147fd9fdf6d77eef

    • SHA256

      c302331fbd65bad40e055b2ddb03d41ad181f4af6dc4daec9ea80d9f63b09030

    • SHA512

      e65156ddfa0fcd655456264560a4595e420e5d5e51e2cbb1a891a00b2c5bff0a6544668a42949e607bf6350f617029a6fa380542010a71d7c007c6c2b53547b1

    • SSDEEP

      49152:yUr37p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpXu/nRFfjI7L0qb:yKHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks