General
-
Target
a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4
-
Size
5.0MB
-
Sample
240731-bpxvkaygjn
-
MD5
93ad1a38b740881308f9492b58087be4
-
SHA1
f10d052b2ad88d1dbd18106e905a8d2bdd25beb8
-
SHA256
a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4
-
SHA512
2bc31e6aceb9f1b0742df897a06460eaed766bd024093e1da7e5f5e4d1ad3c68744131cc2f419f0b330ae08b884c227582a24b00a76045333ef7099906c13eee
-
SSDEEP
24576:mBB4MROxnFE3viyrrcI0AilFEvxHPloo25+G7v/6:mQMiuqyrrcI0AilFEvxHP65+Un
Behavioral task
behavioral1
Sample
a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4.exe
Resource
win7-20240708-en
Malware Config
Extracted
orcus
192.168.237.51:10135
db01bc20e2f0413a9aa19ef1aa8b967e
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\cncmd.exe
Targets
-
-
Target
a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4
-
Size
5.0MB
-
MD5
93ad1a38b740881308f9492b58087be4
-
SHA1
f10d052b2ad88d1dbd18106e905a8d2bdd25beb8
-
SHA256
a96b129e94f234a2a5c30d344c8f25c23e76e3e2b3d2c20ea608b46bb9f7f2b4
-
SHA512
2bc31e6aceb9f1b0742df897a06460eaed766bd024093e1da7e5f5e4d1ad3c68744131cc2f419f0b330ae08b884c227582a24b00a76045333ef7099906c13eee
-
SSDEEP
24576:mBB4MROxnFE3viyrrcI0AilFEvxHPloo25+G7v/6:mQMiuqyrrcI0AilFEvxHP65+Un
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-