General

  • Target

    dsae.exe

  • Size

    839KB

  • Sample

    240903-2fqyrsyfpm

  • MD5

    454e52b6a5f64bdc6efda1ee5de55130

  • SHA1

    4a90b9c0ad2d604dbee485b724c396b836b66234

  • SHA256

    984986e8b2092873083f2da24c3eb6d667a5817341bd168b86c5fc7443db1ed4

  • SHA512

    b191d89abe9930eb4cfba67a9f51ba4c3190ee52ca5f4e513cdda148e304ea127de61248dd3edfb95846e0aaac747578eddf4e32666f9e02b5919a1ab4314c77

  • SSDEEP

    24576:GZS04YNEMuExDiU6E5R9s8xY/2l/dWtnIbt+rg:Gb4auS+UjfU2TWdIbt+r

Malware Config

Extracted

Family

orcus

C2

127.0.0.1

photography-stopping.gl.at.ply.gg

Mutex

39845dd551c747eb9298e3546027d453

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    09/03/2024 17:28:52

  • plugins

    AgEAAA==

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_name

    Audio HD Driver

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Targets

    • Target

      dsae.exe

    • Size

      839KB

    • MD5

      454e52b6a5f64bdc6efda1ee5de55130

    • SHA1

      4a90b9c0ad2d604dbee485b724c396b836b66234

    • SHA256

      984986e8b2092873083f2da24c3eb6d667a5817341bd168b86c5fc7443db1ed4

    • SHA512

      b191d89abe9930eb4cfba67a9f51ba4c3190ee52ca5f4e513cdda148e304ea127de61248dd3edfb95846e0aaac747578eddf4e32666f9e02b5919a1ab4314c77

    • SSDEEP

      24576:GZS04YNEMuExDiU6E5R9s8xY/2l/dWtnIbt+rg:Gb4auS+UjfU2TWdIbt+r

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks