General

  • Target

    482d22b0e2645800df97a50361729262_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240715-etfzdszfrd

  • MD5

    482d22b0e2645800df97a50361729262

  • SHA1

    dd840651c26eb3ae32c1d5eea34082732faec57d

  • SHA256

    b554655fd8f7c0af47fde80bb407cfd3720cf711c035fb5baccde237a4bf6767

  • SHA512

    9d4013a210bc0da6e7f819913e2bbd55c61de7a9d3c9daf18b8bccad9c94a4b0b2344333d7de316dad154eb8f0c0d4731f45b997b24102e0dc8a13b3ed7b3305

  • SSDEEP

    24576:QqnRVYFHkcOqNe8q1AKW9LjGgXt3fiye:QqnUVkcOqNemGot3

Malware Config

Extracted

Family

orcus

Botnet

Other

C2

192.168.1.18:8888

Mutex

23c1575a56274e09adaece4c5bafe7c2

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Windows Defender\MsNpEng.exe

  • reconnect_delay

    10000

  • registry_keyname

    WindowsDefender

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    Temp\svchost.exe

Targets

    • Target

      482d22b0e2645800df97a50361729262_JaffaCakes118

    • Size

      1.1MB

    • MD5

      482d22b0e2645800df97a50361729262

    • SHA1

      dd840651c26eb3ae32c1d5eea34082732faec57d

    • SHA256

      b554655fd8f7c0af47fde80bb407cfd3720cf711c035fb5baccde237a4bf6767

    • SHA512

      9d4013a210bc0da6e7f819913e2bbd55c61de7a9d3c9daf18b8bccad9c94a4b0b2344333d7de316dad154eb8f0c0d4731f45b997b24102e0dc8a13b3ed7b3305

    • SSDEEP

      24576:QqnRVYFHkcOqNe8q1AKW9LjGgXt3fiye:QqnUVkcOqNemGot3

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks