General
-
Target
ratfile.exe
-
Size
1.2MB
-
Sample
240908-b94hvazgle
-
MD5
ce443a57bb5e398e8a913c31fc584712
-
SHA1
415a1980aa8d10fbb573372aed43a844f702f745
-
SHA256
89f47fd3740681dd75dc9bbc414db50e818a1c5df4854fedb331c38eddd27520
-
SHA512
cff4a62d610c272a4abcf302c16f19b3785bb219e074cac7fe6d11098600b6c7eeaa6fb321eefcd0aa68b435268bee9da158d9c17ea553de44192e6e83ea1881
-
SSDEEP
24576:i5WHS04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfyjIbt+rq:i5Wd4auS+UjfU2T/5XDYIbt+r
Malware Config
Extracted
orcus
147.185.221.21
518ccb9293a0468ea001af05d96aaff0
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
09/07/2024 18:49:06
-
plugins
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
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
ratfile.exe
-
Size
1.2MB
-
MD5
ce443a57bb5e398e8a913c31fc584712
-
SHA1
415a1980aa8d10fbb573372aed43a844f702f745
-
SHA256
89f47fd3740681dd75dc9bbc414db50e818a1c5df4854fedb331c38eddd27520
-
SHA512
cff4a62d610c272a4abcf302c16f19b3785bb219e074cac7fe6d11098600b6c7eeaa6fb321eefcd0aa68b435268bee9da158d9c17ea553de44192e6e83ea1881
-
SSDEEP
24576:i5WHS04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfyjIbt+rq:i5Wd4auS+UjfU2T/5XDYIbt+r
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-