Behavioral task
behavioral1
Sample
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Rc7 - Cracked/Rc7.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Rc7 - Cracked/Rc7.dll
Resource
win10v2004-20240709-en
General
-
Target
Rc7-Cracked.zip
-
Size
4.9MB
-
MD5
9605ddef6446ab7108378f4dbe737909
-
SHA1
55bf0a1e7fdc3d3207557a26bdaf3b97b20d294b
-
SHA256
1d2bd211b2cb977bbb59c139387096ab73e1496eb5f6ad1237d8fe7878124872
-
SHA512
c1b2e5ee1f59efee0c7fe085d0b6f433aefe8562d11520d411dfe6dcc1720160b0fb87b97dbb82b5e684609e5c2094bdc33a455a8706670cf36607628ff73506
-
SSDEEP
98304:/HdQSqS2hHDypUVSBjlGZTqP+eRDaolDmAhOiV170HM3kP2/wJzFi5e:VTmAuVqwZTMlRjlDd0iVV0s3b0oE
Malware Config
Extracted
orcus
wowthatsagoodmeme.ddns.net:10134
4be6c8113962424a916b8095b89af0c9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\WlNDOWS DEFENDER\UPDATER.exe
-
reconnect_delay
10000
-
registry_keyname
Wlndows Defender
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\%appdata%/WlNDOWS DEFENDER/WlNDOWS DEFENDER UPDATER.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule static1/unpack001/Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe orcus -
Orcus family
-
Orcus main payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe family_orcus -
Processes:
resource yara_rule static1/unpack001/Rc7 - Cracked/Rc7.dll vmprotect -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe unpack001/Rc7 - Cracked/Rc7.dll
Files
-
Rc7-Cracked.zip.zip
-
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 902KB - Virtual size: 902KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Rc7 - Cracked/Rc7.dll.dll windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: - Virtual size: 532KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ