General

  • Target

    Orcus RAT 1.9.1 - Cracked.rar

  • Size

    19.6MB

  • Sample

    240921-v8d2cavemn

  • MD5

    f6060499c0208ea16994272669b31c4c

  • SHA1

    088d24d9d2fb11fc1b9cef31d0340e6af305b3d1

  • SHA256

    4e0b7d669194ed09b71cb46f27fc34b8fbdb3ac117f71e0d82580f7cf9955716

  • SHA512

    486796c59e15caf62bd0f52ac3e6bbc0e15655ec09ead7f7195274cf5ddca119d25190bebb4405a6d968ab39377598891b748b1010d1b0cb7fe5290c2caf5fc5

  • SSDEEP

    393216:ZwAncQu/6CjdwG6MTODmJd6vx3SOlcsUz9T6AUs5B/hvK9EULCXR4p8+D24Ils2v:ZwAncQm6CjdwG3QvhysUz9WAr1qfLkR5

Malware Config

Targets

    • Target

      Orcus RAT 1.9.1 - Cracked/Orcus.Administration-cracked.exe

    • Size

      5.1MB

    • MD5

      2a9cce77881640f9d0560a3d3769495a

    • SHA1

      0f85f15889ca1d974acd297c31ef69a529dfc689

    • SHA256

      8559769d20c4435067ccd3cfbf713bd93c7e04a7932fac523c5f8923d9d6b64b

    • SHA512

      443d4f634a2535da884671538e1129a9bac3e404a958f276890b4e40dfda18275c490d7e0d100f9e0982506e610a8235f272c53618a83c1b852a84f5682f6b98

    • SSDEEP

      98304:pDjpjAI3EQGA7rsMBB0tLqH0b/u1FMS7A0BeLbrv/dwqSRatuZu2cjQPYo4NXAl4:djpsI9VhB6tmUbVSU7/aq4aQZuLo4

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks