General

  • Target

    f8d622954cef4882bc8a0a77ad399604_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240926-vmtjxaydjp

  • MD5

    f8d622954cef4882bc8a0a77ad399604

  • SHA1

    0e904cebd41ae2aaa1947aeaf431449b319e07f6

  • SHA256

    15a56267ca5e39c679432257291333d4878e70650d419dca6c90b942377b043f

  • SHA512

    c4f9eeb7d9c49e742785b4a1f04ab677a9086d898b3c725bf9d32cebf4d5718a205b5e13f7bc64510f6169fef787636c49c45e3370f9ff29959514f867e893a5

  • SSDEEP

    49152:RmizTCwwGX9AvRoaXp2kEfhHsXrAolZHTJx:Rvz7/+RzpMhz6Htx

Malware Config

Extracted

Family

orcus

Botnet

DESK-100618

C2

poulty55.chickenkiller.com:9030

Mutex

a386a045d9c842428c74de4ed9645fe9

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10002

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      f8d622954cef4882bc8a0a77ad399604_JaffaCakes118

    • Size

      1.6MB

    • MD5

      f8d622954cef4882bc8a0a77ad399604

    • SHA1

      0e904cebd41ae2aaa1947aeaf431449b319e07f6

    • SHA256

      15a56267ca5e39c679432257291333d4878e70650d419dca6c90b942377b043f

    • SHA512

      c4f9eeb7d9c49e742785b4a1f04ab677a9086d898b3c725bf9d32cebf4d5718a205b5e13f7bc64510f6169fef787636c49c45e3370f9ff29959514f867e893a5

    • SSDEEP

      49152:RmizTCwwGX9AvRoaXp2kEfhHsXrAolZHTJx:Rvz7/+RzpMhz6Htx

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcurs Rat Executable

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks