General

  • Target

    9fa4cccfa53bad5661ce943e04c9be90N

  • Size

    903KB

  • Sample

    240908-clwc1a1enh

  • MD5

    9fa4cccfa53bad5661ce943e04c9be90

  • SHA1

    56e7b9ff0e9cb7f4c051a87d2d09f7af153228c0

  • SHA256

    20393d6470b7bc3377893a522fa0d1e55683a583263e581d7460e3cd8e6155f2

  • SHA512

    382b4e97dc9b0465e21866f957181756d1ebb6f98d562bd8771632af905b1cc5e3761dfd438c0de2a72ce6439427e07b7429875ecc0cbff9aa0e99cc62296696

  • SSDEEP

    12288:j0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCBfm9rR6W7BaepBwzo7dG1lFlWV:gam4MROxnF4HrrcI0AilFEvxHPToo1

Malware Config

Extracted

Family

orcus

C2

s1.putinso.site:2047

Mutex

c324c0dedf48483e98d1048845609497

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %appdata%\mine\updater.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    updater

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      9fa4cccfa53bad5661ce943e04c9be90N

    • Size

      903KB

    • MD5

      9fa4cccfa53bad5661ce943e04c9be90

    • SHA1

      56e7b9ff0e9cb7f4c051a87d2d09f7af153228c0

    • SHA256

      20393d6470b7bc3377893a522fa0d1e55683a583263e581d7460e3cd8e6155f2

    • SHA512

      382b4e97dc9b0465e21866f957181756d1ebb6f98d562bd8771632af905b1cc5e3761dfd438c0de2a72ce6439427e07b7429875ecc0cbff9aa0e99cc62296696

    • SSDEEP

      12288:j0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCBfm9rR6W7BaepBwzo7dG1lFlWV:gam4MROxnF4HrrcI0AilFEvxHPToo1

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks