General
-
Target
778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38
-
Size
924KB
-
Sample
240701-bfgrzsvbrl
-
MD5
0ee7e99678417ed9774308a536b29429
-
SHA1
90b5785ce51cf35c2bc176aafd42ddb75e945135
-
SHA256
778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38
-
SHA512
0a7c6657c6650d4ce88b1a25312f5c3a84077966558f97459aa60e7f36234f0883fd9c2f5148ae93a6eedd524a99aa45dd41f4c0ae816e4d9895a3375630570e
-
SSDEEP
24576:lmHR4MROxnFE3kO30rrcI0AilFEvxHPNBoog:suMiuB0rrcI0AilFEvxHP
Behavioral task
behavioral1
Sample
778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
orcus
192.168.56.1:32123
a2a32c9071074ce38ee0f2d33ff430a3
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
ti pidorasik
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38
-
Size
924KB
-
MD5
0ee7e99678417ed9774308a536b29429
-
SHA1
90b5785ce51cf35c2bc176aafd42ddb75e945135
-
SHA256
778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38
-
SHA512
0a7c6657c6650d4ce88b1a25312f5c3a84077966558f97459aa60e7f36234f0883fd9c2f5148ae93a6eedd524a99aa45dd41f4c0ae816e4d9895a3375630570e
-
SSDEEP
24576:lmHR4MROxnFE3kO30rrcI0AilFEvxHPNBoog:suMiuB0rrcI0AilFEvxHP
Score10/10-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-