General

  • Target

    5ccf3a06eeaa035c5b4b60f44e7820692c015208d62e415a3c224c009edde3df

  • Size

    3.2MB

  • MD5

    90cd2e9c676fc284584653b5d4f95126

  • SHA1

    4e1a138d45e7833d1eb4205606cdd7f4508bce5c

  • SHA256

    5ccf3a06eeaa035c5b4b60f44e7820692c015208d62e415a3c224c009edde3df

  • SHA512

    57166446c7743344914d2c1e089e066bc0ddddc29cb8e64e801f01c63f6287d524a3778a7d67070779e90ad31e7b0675f081dafbd32b34aa407e20706885a146

  • SSDEEP

    49152:oGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:oLHTPJg8z1mKnypSbRxo9JCm

Score
10/10

Malware Config

Extracted

Family

orcus

Botnet

FunPay

C2

31.44.184.52:44657

Mutex

sudo_vm3jypee5e4wpgyaqsjreb4akskikm0b

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\privategamebase\Discord.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5ccf3a06eeaa035c5b4b60f44e7820692c015208d62e415a3c224c009edde3df
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections