General

  • Target

    d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be

  • Size

    920KB

  • Sample

    240624-bfpslasblf

  • MD5

    fab0a2c77bda98e6c958a21680f32a7a

  • SHA1

    6aa4cd576faa20fad993aafe960cfba3f50d177a

  • SHA256

    d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be

  • SHA512

    77625408955c571b83172623eec9bba6a715da00192646b71a80a6ce7bff9b237df892672013aef5df45b356c55d8b50d93951aef9562020e2eeecf00c89b64e

  • SSDEEP

    24576:++A4MROxnFt3kcfrrcI0AilFEvxHPUCooN:+YMijFrrcI0AilFEvxHPU

Malware Config

Extracted

Family

orcus

C2

192.168.56.1:6969

Mutex

7a0301b502164f309e37ed4746914dc2

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\csgo.exe

Targets

    • Target

      d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be

    • Size

      920KB

    • MD5

      fab0a2c77bda98e6c958a21680f32a7a

    • SHA1

      6aa4cd576faa20fad993aafe960cfba3f50d177a

    • SHA256

      d6733905474e09a72f9d54a5f36046e3b98417b2332d4b4f2451981c32cbe3be

    • SHA512

      77625408955c571b83172623eec9bba6a715da00192646b71a80a6ce7bff9b237df892672013aef5df45b356c55d8b50d93951aef9562020e2eeecf00c89b64e

    • SSDEEP

      24576:++A4MROxnFt3kcfrrcI0AilFEvxHPUCooN:+YMijFrrcI0AilFEvxHPU

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks