General

  • Target

    d2700db3d7145017e4570a4e19aa6e44dc1a87543637e1195dbe169318c16dd0

  • Size

    922KB

  • Sample

    240611-bx9jbszcjr

  • MD5

    2f3d6c45b5c428d17471d1c4d1c066a6

  • SHA1

    ef3ae75ab3bbef79f8e56ce313f2813e096f2bb7

  • SHA256

    d2700db3d7145017e4570a4e19aa6e44dc1a87543637e1195dbe169318c16dd0

  • SHA512

    417a9fdbf7006c0b09386b75ac8ed24be44eda2a7e3263c093e0dd2eb109a2f167ac2ac8168f709c06abccee03e9de97456d03a3afa6852e278b49af1e342502

  • SSDEEP

    24576:21j4MROxnFi3xs4rrcI0AilFEvxHPuooyX:2iMioK4rrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

Blumhack

C2

192.168.1.69:10134

Mutex

92734687817a427285a117577619b55d

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Blumhack

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      d2700db3d7145017e4570a4e19aa6e44dc1a87543637e1195dbe169318c16dd0

    • Size

      922KB

    • MD5

      2f3d6c45b5c428d17471d1c4d1c066a6

    • SHA1

      ef3ae75ab3bbef79f8e56ce313f2813e096f2bb7

    • SHA256

      d2700db3d7145017e4570a4e19aa6e44dc1a87543637e1195dbe169318c16dd0

    • SHA512

      417a9fdbf7006c0b09386b75ac8ed24be44eda2a7e3263c093e0dd2eb109a2f167ac2ac8168f709c06abccee03e9de97456d03a3afa6852e278b49af1e342502

    • SSDEEP

      24576:21j4MROxnFi3xs4rrcI0AilFEvxHPuooyX:2iMioK4rrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks