General

  • Target

    6a304800218605bbf0376a4937917dd0N.exe

  • Size

    912KB

  • Sample

    240715-dewkvsxdra

  • MD5

    6a304800218605bbf0376a4937917dd0

  • SHA1

    7e1915f93fcc6d68c3f149f41cf1f2920c000d0e

  • SHA256

    f0ceff7c867f684a2dfd4cdde69d70b7706cf75572564ca73ccff961067e7e78

  • SHA512

    23d165c56750543a7e4fbf1b6b7c8beed52e368d19b10f09c596f42c582e8887ac44cec2e46228b910ce50c72996106f65076d093a877138eaaba327f693a85a

  • SSDEEP

    24576:5JNZ4MROxnFIFPurerrcI0AilFEvxHPVoow:5yMi/errcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

caquita

C2

192.168.218.83:10134

Mutex

b5e6880088804f548175e49c6b0d8710

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      6a304800218605bbf0376a4937917dd0N.exe

    • Size

      912KB

    • MD5

      6a304800218605bbf0376a4937917dd0

    • SHA1

      7e1915f93fcc6d68c3f149f41cf1f2920c000d0e

    • SHA256

      f0ceff7c867f684a2dfd4cdde69d70b7706cf75572564ca73ccff961067e7e78

    • SHA512

      23d165c56750543a7e4fbf1b6b7c8beed52e368d19b10f09c596f42c582e8887ac44cec2e46228b910ce50c72996106f65076d093a877138eaaba327f693a85a

    • SSDEEP

      24576:5JNZ4MROxnFIFPurerrcI0AilFEvxHPVoow:5yMi/errcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks