General

  • Target

    92cb46649d17f705f8dc4b40c8249e5d_JaffaCakes118

  • Size

    807KB

  • Sample

    240813-m6g18avbnr

  • MD5

    92cb46649d17f705f8dc4b40c8249e5d

  • SHA1

    34423e36244fc5af2094bfb5c33a5ed901aea10b

  • SHA256

    64b038f384d0874da18ca9f23577e37ea14fe8fb8885891f6266b3005d79848d

  • SHA512

    0112ef4fb5a03dd56f21f94920e28a642273f3ecf55767a4ba0ddfc6c1f295fb0979c529e138b0040dad2410ef489b55d2a36a1beb1c087995929afd6942d0e1

  • SSDEEP

    24576:SWYo6jAdtku7+GMAh/B1yQe8QEEWsj6W8Jk:pKwtkwOI1yQ9QKG

Malware Config

Extracted

Family

orcus

Botnet

GamingServicesNet.exe

C2

richhost.ddns.net:11111

Mutex

5685cd45f79c4143988da4021522dcb1

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %programfiles%\WindowsApps\Microsoft.GamingServices_2.47.10001.0_x64__8wekyb3d8bbwe\GamingServicesNetFramework.exe

  • reconnect_delay

    10000

  • registry_keyname

    NetFrameworkTask

  • taskscheduler_taskname

    NetFrameworkTask

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      92cb46649d17f705f8dc4b40c8249e5d_JaffaCakes118

    • Size

      807KB

    • MD5

      92cb46649d17f705f8dc4b40c8249e5d

    • SHA1

      34423e36244fc5af2094bfb5c33a5ed901aea10b

    • SHA256

      64b038f384d0874da18ca9f23577e37ea14fe8fb8885891f6266b3005d79848d

    • SHA512

      0112ef4fb5a03dd56f21f94920e28a642273f3ecf55767a4ba0ddfc6c1f295fb0979c529e138b0040dad2410ef489b55d2a36a1beb1c087995929afd6942d0e1

    • SSDEEP

      24576:SWYo6jAdtku7+GMAh/B1yQe8QEEWsj6W8Jk:pKwtkwOI1yQ9QKG

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks