General

  • Target

    cf3fcc3aed42efdaa1e4b92b985d582d68376932136797e646f97e13a9383768

  • Size

    142.0MB

  • Sample

    240609-bl8snaca44

  • MD5

    8ec31f21bbd85409821e9ff46905de10

  • SHA1

    73d0917083d30de5c3ef9be8ee9f89911bbba77f

  • SHA256

    cf3fcc3aed42efdaa1e4b92b985d582d68376932136797e646f97e13a9383768

  • SHA512

    a95a59bdf0b8aa2cdbe6089c7a71935c35151757d8624e7e89b4ebe8b9709436c13d40003f9fd882269d67ea0908b19e13f08d1db92159064f5e1d2b968f5ec1

  • SSDEEP

    12288:jvQljshUuGBupksQ7dG1lFlWcYT70pxnnaaoawt7ueuRA8rZNrI0AilFEvxHvBMn:qsw4MROxnFd9vrZlI0AilFEvxHiCS

Malware Config

Extracted

Family

orcus

C2

192.168.0.150:8848

Mutex

cc95a8263dac4c43869aeacd03467e30

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Windows Update Check

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      cf3fcc3aed42efdaa1e4b92b985d582d68376932136797e646f97e13a9383768

    • Size

      142.0MB

    • MD5

      8ec31f21bbd85409821e9ff46905de10

    • SHA1

      73d0917083d30de5c3ef9be8ee9f89911bbba77f

    • SHA256

      cf3fcc3aed42efdaa1e4b92b985d582d68376932136797e646f97e13a9383768

    • SHA512

      a95a59bdf0b8aa2cdbe6089c7a71935c35151757d8624e7e89b4ebe8b9709436c13d40003f9fd882269d67ea0908b19e13f08d1db92159064f5e1d2b968f5ec1

    • SSDEEP

      12288:jvQljshUuGBupksQ7dG1lFlWcYT70pxnnaaoawt7ueuRA8rZNrI0AilFEvxHvBMn:qsw4MROxnFd9vrZlI0AilFEvxHiCS

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks