General

  • Target

    3aecd39225de5f274e45c1f200754a0d5f98eba87d54328bab30de1f2c629a69

  • Size

    916KB

  • Sample

    240607-brnpnsfb4v

  • MD5

    c18aa87310422a593b3f7da5e5bb6484

  • SHA1

    6e91dc3fd926f6eef6c88f94ef06e87cb6a4f29a

  • SHA256

    3aecd39225de5f274e45c1f200754a0d5f98eba87d54328bab30de1f2c629a69

  • SHA512

    e2ee610656e0b5b4610ea5728efbd579811d29e6fb9c0eafa9653fd6df66baca7544294d9f923e643e25007a5375208aa95f52350e64aebfecd929080da42d76

  • SSDEEP

    12288:6XBM21gsgPktzYX7dG1lFlWcYT70pxnnaaoawp7ueuRAKrZNrI0AilFEvxHvBMBL:luQ4MROxnFJ9JrZlI0AilFEvxHiTDp

Malware Config

Extracted

Family

orcus

C2

192.168.0.150:8848

Mutex

104ac7067d804737b655e3e0f14f31f4

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      3aecd39225de5f274e45c1f200754a0d5f98eba87d54328bab30de1f2c629a69

    • Size

      916KB

    • MD5

      c18aa87310422a593b3f7da5e5bb6484

    • SHA1

      6e91dc3fd926f6eef6c88f94ef06e87cb6a4f29a

    • SHA256

      3aecd39225de5f274e45c1f200754a0d5f98eba87d54328bab30de1f2c629a69

    • SHA512

      e2ee610656e0b5b4610ea5728efbd579811d29e6fb9c0eafa9653fd6df66baca7544294d9f923e643e25007a5375208aa95f52350e64aebfecd929080da42d76

    • SSDEEP

      12288:6XBM21gsgPktzYX7dG1lFlWcYT70pxnnaaoawp7ueuRAKrZNrI0AilFEvxHvBMBL:luQ4MROxnFJ9JrZlI0AilFEvxHiTDp

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks