Behavioral task
behavioral1
Sample
Rc7- Cracked by Roque Exploitzz.exe
Resource
win10v2004-20240709-en
General
-
Target
Rc7- Cracked by Roque Exploitzz.exe
-
Size
907KB
-
MD5
5668bd983341f9ffd4726d887090b64c
-
SHA1
1a150545d2fb65240101f9466b1043269b379f25
-
SHA256
afb1bf7f37ba0ff0ccd8fa29c7089abc4975fef56155ab9f3c1535fea70b1f0d
-
SHA512
0dcb2b2a1c2ee10c3b3727e3cfde698ec339569003bc3e18a6b76de65e7497080799d2e52fae234cb4e5ab518a296bf0d4f2f350f0571a1b39bc8b3e584c6ed1
-
SSDEEP
24576:nhv4MROxnFj3IrkxrrcI0AilFEvxHPyooT:nKMi1UqrrcI0AilFEvxHP
Malware Config
Extracted
orcus
wowthatsagoodmeme.ddns.net:10134
4be6c8113962424a916b8095b89af0c9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\WlNDOWS DEFENDER\UPDATER.exe
-
reconnect_delay
10000
-
registry_keyname
Wlndows Defender
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\%appdata%/WlNDOWS DEFENDER/WlNDOWS DEFENDER UPDATER.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Rc7- Cracked by Roque Exploitzz.exe
Files
-
Rc7- Cracked by Roque Exploitzz.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 902KB - Virtual size: 902KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ