General
-
Target
482d22b0e2645800df97a50361729262_JaffaCakes118
-
Size
1.1MB
-
Sample
240715-etfzdszfrd
-
MD5
482d22b0e2645800df97a50361729262
-
SHA1
dd840651c26eb3ae32c1d5eea34082732faec57d
-
SHA256
b554655fd8f7c0af47fde80bb407cfd3720cf711c035fb5baccde237a4bf6767
-
SHA512
9d4013a210bc0da6e7f819913e2bbd55c61de7a9d3c9daf18b8bccad9c94a4b0b2344333d7de316dad154eb8f0c0d4731f45b997b24102e0dc8a13b3ed7b3305
-
SSDEEP
24576:QqnRVYFHkcOqNe8q1AKW9LjGgXt3fiye:QqnUVkcOqNemGot3
Static task
static1
Behavioral task
behavioral1
Sample
482d22b0e2645800df97a50361729262_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
orcus
Other
192.168.1.18:8888
23c1575a56274e09adaece4c5bafe7c2
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Windows Defender\MsNpEng.exe
-
reconnect_delay
10000
-
registry_keyname
WindowsDefender
-
taskscheduler_taskname
Orcus
-
watchdog_path
Temp\svchost.exe
Targets
-
-
Target
482d22b0e2645800df97a50361729262_JaffaCakes118
-
Size
1.1MB
-
MD5
482d22b0e2645800df97a50361729262
-
SHA1
dd840651c26eb3ae32c1d5eea34082732faec57d
-
SHA256
b554655fd8f7c0af47fde80bb407cfd3720cf711c035fb5baccde237a4bf6767
-
SHA512
9d4013a210bc0da6e7f819913e2bbd55c61de7a9d3c9daf18b8bccad9c94a4b0b2344333d7de316dad154eb8f0c0d4731f45b997b24102e0dc8a13b3ed7b3305
-
SSDEEP
24576:QqnRVYFHkcOqNe8q1AKW9LjGgXt3fiye:QqnUVkcOqNemGot3
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-