General

  • Target

    Nursultan.exe

  • Size

    3.4MB

  • Sample

    240801-y7d7hazfpd

  • MD5

    0f9f82607781767d36bb032b09260847

  • SHA1

    92996f91d7ed53466dd3edc6c543d5b1b9e8c1cf

  • SHA256

    90fb58399388db6e22f44e41a7c2d25e61f7ae9565b8a1b775e10a3dee0fb7ea

  • SHA512

    033bd502642c0f0fb89e8399aee7ca5027cb5a19530ca9f88b9594e7404faec78b7a3eaeced5cf2ff4fa5ae5c74da148cbbacabc657f9b6f70bfe073e63e6123

  • SSDEEP

    49152:5GX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbq:5LHTPJg8z1mKnypSbRxo9JCmD

Malware Config

Extracted

Family

orcus

Botnet

Nursultan

C2

31.44.184.52:54370

Mutex

sudo_jdu3yd4dgo4y8e1pp6azrvrqmxk9e5mb

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\linecdnimage\secureuploads.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      Nursultan.exe

    • Size

      3.4MB

    • MD5

      0f9f82607781767d36bb032b09260847

    • SHA1

      92996f91d7ed53466dd3edc6c543d5b1b9e8c1cf

    • SHA256

      90fb58399388db6e22f44e41a7c2d25e61f7ae9565b8a1b775e10a3dee0fb7ea

    • SHA512

      033bd502642c0f0fb89e8399aee7ca5027cb5a19530ca9f88b9594e7404faec78b7a3eaeced5cf2ff4fa5ae5c74da148cbbacabc657f9b6f70bfe073e63e6123

    • SSDEEP

      49152:5GX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbq:5LHTPJg8z1mKnypSbRxo9JCmD

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks