General
-
Target
Orcus RAT 1.9.1 - Cracked.rar
-
Size
19.6MB
-
Sample
240921-v8d2cavemn
-
MD5
f6060499c0208ea16994272669b31c4c
-
SHA1
088d24d9d2fb11fc1b9cef31d0340e6af305b3d1
-
SHA256
4e0b7d669194ed09b71cb46f27fc34b8fbdb3ac117f71e0d82580f7cf9955716
-
SHA512
486796c59e15caf62bd0f52ac3e6bbc0e15655ec09ead7f7195274cf5ddca119d25190bebb4405a6d968ab39377598891b748b1010d1b0cb7fe5290c2caf5fc5
-
SSDEEP
393216:ZwAncQu/6CjdwG6MTODmJd6vx3SOlcsUz9T6AUs5B/hvK9EULCXR4p8+D24Ils2v:ZwAncQm6CjdwG3QvhysUz9WAr1qfLkR5
Malware Config
Targets
-
-
Target
Orcus RAT 1.9.1 - Cracked/Orcus.Administration-cracked.exe
-
Size
5.1MB
-
MD5
2a9cce77881640f9d0560a3d3769495a
-
SHA1
0f85f15889ca1d974acd297c31ef69a529dfc689
-
SHA256
8559769d20c4435067ccd3cfbf713bd93c7e04a7932fac523c5f8923d9d6b64b
-
SHA512
443d4f634a2535da884671538e1129a9bac3e404a958f276890b4e40dfda18275c490d7e0d100f9e0982506e610a8235f272c53618a83c1b852a84f5682f6b98
-
SSDEEP
98304:pDjpjAI3EQGA7rsMBB0tLqH0b/u1FMS7A0BeLbrv/dwqSRatuZu2cjQPYo4NXAl4:djpsI9VhB6tmUbVSU7/aq4aQZuLo4
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-