General

  • Target

    6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4

  • Size

    1.2MB

  • Sample

    240603-bjcx7sfb35

  • MD5

    484ccd343ab6a5c338b67264a6fdb5d3

  • SHA1

    1bd30cc22cbd8813e5218548b0cb301e170bbc83

  • SHA256

    6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4

  • SHA512

    a93d07c673734b069e3d507377534eea6c33e29239045be62e16c7fb6d518d02c11150e45420a2d3b0e16d6b1f99f5d631c3782b624c2073c5b42a11cb2bb95f

  • SSDEEP

    24576:rGK4MROxnFE32O3KrrcI0AilFEvxHPyoos/:rKMiujKrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:666

Mutex

7d31cc59ebdf4dc49809adc208f79149

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\ChromiumUpdated\Updater.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    svchost

  • watchdog_path

    AppData\sihost.exe

Targets

    • Target

      6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4

    • Size

      1.2MB

    • MD5

      484ccd343ab6a5c338b67264a6fdb5d3

    • SHA1

      1bd30cc22cbd8813e5218548b0cb301e170bbc83

    • SHA256

      6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4

    • SHA512

      a93d07c673734b069e3d507377534eea6c33e29239045be62e16c7fb6d518d02c11150e45420a2d3b0e16d6b1f99f5d631c3782b624c2073c5b42a11cb2bb95f

    • SSDEEP

      24576:rGK4MROxnFE32O3KrrcI0AilFEvxHPyoos/:rKMiujKrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks