General
-
Target
0227339e66ffc8536e29c5d941b6d97368ca067b4aa62ab334aada6f075694d7
-
Size
917KB
-
Sample
240603-bfy19sdf4s
-
MD5
668520daa3022bddaa770b23dc408d55
-
SHA1
a80280d6cf9b887bb1badc482f29e71f2ee7c45b
-
SHA256
0227339e66ffc8536e29c5d941b6d97368ca067b4aa62ab334aada6f075694d7
-
SHA512
2b5f132055ade2629e0e8eedcb8183b53662d9602f51d90da4dfed0b4a9635ef04897f3912d59ff886168ab04813c4e3967de2aeb067a5c0a1bcd622c4adfb95
-
SSDEEP
24576:sNL34MROxnFD3Ew8XlrrcI0AilFEvxHProoT:sWMiJIrrcI0AilFEvxHP
Behavioral task
behavioral1
Sample
0227339e66ffc8536e29c5d941b6d97368ca067b4aa62ab334aada6f075694d7.exe
Resource
win7-20240215-en
Malware Config
Extracted
orcus
medicine-pushing.gl.at.ply.gg:50488
da4f27f56f6c4be9b71a93002d0bd352
-
autostart_method
TaskScheduler
-
enable_keylogger
false
-
install_path
%programfiles%\Edge\Application\msruntime.exe
-
reconnect_delay
10000
-
registry_keyname
Microsoft Edge
-
taskscheduler_taskname
Microsoft Edge Startup
-
watchdog_path
AppData\tasklist.exe
Targets
-
-
Target
0227339e66ffc8536e29c5d941b6d97368ca067b4aa62ab334aada6f075694d7
-
Size
917KB
-
MD5
668520daa3022bddaa770b23dc408d55
-
SHA1
a80280d6cf9b887bb1badc482f29e71f2ee7c45b
-
SHA256
0227339e66ffc8536e29c5d941b6d97368ca067b4aa62ab334aada6f075694d7
-
SHA512
2b5f132055ade2629e0e8eedcb8183b53662d9602f51d90da4dfed0b4a9635ef04897f3912d59ff886168ab04813c4e3967de2aeb067a5c0a1bcd622c4adfb95
-
SSDEEP
24576:sNL34MROxnFD3Ew8XlrrcI0AilFEvxHProoT:sWMiJIrrcI0AilFEvxHP
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-