General
-
Target
d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be
-
Size
920KB
-
Sample
240624-bfpslasblf
-
MD5
fab0a2c77bda98e6c958a21680f32a7a
-
SHA1
6aa4cd576faa20fad993aafe960cfba3f50d177a
-
SHA256
d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be
-
SHA512
77625408955c571b83172623eec9bba6a715da00192646b71a80a6ce7bff9b237df892672013aef5df45b356c55d8b50d93951aef9562020e2eeecf00c89b64e
-
SSDEEP
24576:++A4MROxnFt3kcfrrcI0AilFEvxHPUCooN:+YMijFrrcI0AilFEvxHPU
Behavioral task
behavioral1
Sample
d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
orcus
192.168.56.1:6969
7a0301b502164f309e37ed4746914dc2
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\csgo.exe
Targets
-
-
Target
d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be
-
Size
920KB
-
MD5
fab0a2c77bda98e6c958a21680f32a7a
-
SHA1
6aa4cd576faa20fad993aafe960cfba3f50d177a
-
SHA256
d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be
-
SHA512
77625408955c571b83172623eec9bba6a715da00192646b71a80a6ce7bff9b237df892672013aef5df45b356c55d8b50d93951aef9562020e2eeecf00c89b64e
-
SSDEEP
24576:++A4MROxnFt3kcfrrcI0AilFEvxHPUCooN:+YMijFrrcI0AilFEvxHPU
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-