Behavioral task
behavioral1
Sample
374a4654f2a5ef4061fdf971cb43f808b16502e4eab1c0f969d2a7194e6dee0c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
374a4654f2a5ef4061fdf971cb43f808b16502e4eab1c0f969d2a7194e6dee0c.exe
Resource
win10v2004-20240508-en
General
-
Target
374a4654f2a5ef4061fdf971cb43f808b16502e4eab1c0f969d2a7194e6dee0c
-
Size
915KB
-
MD5
5068ade29bf53c33416a18110c7abe26
-
SHA1
9ac01bd400d816ff2cbe003d1f4a729d6cb20615
-
SHA256
374a4654f2a5ef4061fdf971cb43f808b16502e4eab1c0f969d2a7194e6dee0c
-
SHA512
649630c6b5959cb3e35e707748afda96b9ab21b247a8e5440a9a0c665da4ef030f7d71216b6a05bf99a4d6c86353dfa9a26507ea7a9b356fbdab2d031e93d5e7
-
SSDEEP
24576:CEqr4MROxnFi3PrkrZlI0AilFEvxHijb:CEjMioPwrZlI0AilFEvxHi
Malware Config
Extracted
orcus
192.168.56.1:10134
e1b0180577ab46efa4733e10a6bd85df
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Nursultan
-
watchdog_path
AppData\CrackLauncher.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 374a4654f2a5ef4061fdf971cb43f808b16502e4eab1c0f969d2a7194e6dee0c
Files
-
374a4654f2a5ef4061fdf971cb43f808b16502e4eab1c0f969d2a7194e6dee0c.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ