General

  • Target

    a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4

  • Size

    5.0MB

  • Sample

    240731-bpxvkaygjn

  • MD5

    93ad1a38b740881308f9492b58087be4

  • SHA1

    f10d052b2ad88d1dbd18106e905a8d2bdd25beb8

  • SHA256

    a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4

  • SHA512

    2bc31e6aceb9f1b0742df897a06460eaed766bd024093e1da7e5f5e4d1ad3c68744131cc2f419f0b330ae08b884c227582a24b00a76045333ef7099906c13eee

  • SSDEEP

    24576:mBB4MROxnFE3viyrrcI0AilFEvxHPloo25+G7v/6:mQMiuqyrrcI0AilFEvxHP65+Un

Malware Config

Extracted

Family

orcus

C2

192.168.237.51:10135

Mutex

db01bc20e2f0413a9aa19ef1aa8b967e

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\cncmd.exe

Targets

    • Target

      a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4

    • Size

      5.0MB

    • MD5

      93ad1a38b740881308f9492b58087be4

    • SHA1

      f10d052b2ad88d1dbd18106e905a8d2bdd25beb8

    • SHA256

      a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4

    • SHA512

      2bc31e6aceb9f1b0742df897a06460eaed766bd024093e1da7e5f5e4d1ad3c68744131cc2f419f0b330ae08b884c227582a24b00a76045333ef7099906c13eee

    • SSDEEP

      24576:mBB4MROxnFE3viyrrcI0AilFEvxHPloo25+G7v/6:mQMiuqyrrcI0AilFEvxHP65+Un

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks