General
-
Target
68c2573d2ba5a1f845aa42a24a63542fb8f8a97bc2223cb3d7f4cb674aa190b2
-
Size
924KB
-
Sample
240623-bdy89axbjp
-
MD5
b9941c3d4dbe7b3a7a74517ca5577e81
-
SHA1
ac5d234b16377491c3891dec2a628d2f13a5b6c5
-
SHA256
68c2573d2ba5a1f845aa42a24a63542fb8f8a97bc2223cb3d7f4cb674aa190b2
-
SHA512
01aed78d3b15e49c723a5c09caf8003d548d6fbc166fec989b0795f2723868d75c3a1bcd936115f0163d7750d50ec8c297a7b784851556c419b4869e178afc25
-
SSDEEP
12288:e0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNC7JsLdn487Rhp2sxuw7dG1lFlWK:bJ14MROxnFE3sFrrcI0AilFEvxHjUQf
Behavioral task
behavioral1
Sample
68c2573d2ba5a1f845aa42a24a63542fb8f8a97bc2223cb3d7f4cb674aa190b2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68c2573d2ba5a1f845aa42a24a63542fb8f8a97bc2223cb3d7f4cb674aa190b2.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
orcus
147.185.221.229:56094
2e76dc04b91f4090b8ce38a21dda6ce7
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\svhost\svhost.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\svhost.exe
Targets
-
-
Target
68c2573d2ba5a1f845aa42a24a63542fb8f8a97bc2223cb3d7f4cb674aa190b2
-
Size
924KB
-
MD5
b9941c3d4dbe7b3a7a74517ca5577e81
-
SHA1
ac5d234b16377491c3891dec2a628d2f13a5b6c5
-
SHA256
68c2573d2ba5a1f845aa42a24a63542fb8f8a97bc2223cb3d7f4cb674aa190b2
-
SHA512
01aed78d3b15e49c723a5c09caf8003d548d6fbc166fec989b0795f2723868d75c3a1bcd936115f0163d7750d50ec8c297a7b784851556c419b4869e178afc25
-
SSDEEP
12288:e0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNC7JsLdn487Rhp2sxuw7dG1lFlWK:bJ14MROxnFE3sFrrcI0AilFEvxHjUQf
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-