General

  • Target

    fd0adf2d624744c1d5bd260f3f74e70c_JaffaCakes118

  • Size

    4.0MB

  • Sample

    240928-yq7gqaxakh

  • MD5

    fd0adf2d624744c1d5bd260f3f74e70c

  • SHA1

    4a8ada06c927a7c02895d278f4144069933b4b16

  • SHA256

    696edfb0ae8b67205e48937ef8bcb54f02e46d94933f491d3e9c440d3e10f4da

  • SHA512

    800bbaef8df7596bc35c74ce8eb91852ed9ed893741417e43a8f3b51f284f4c4a53b81fd19b08284a245c9d5756c8601259a2c20530302236c70e52188785108

  • SSDEEP

    98304:/viz/27qWGq/TzuqCDl2Ptao7jveMGDL+DJPrONg:/viq75/TzufceP2KNg

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:1111

Mutex

bd2c55809d1743b78dec11ee665f95e8

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\ORK\ORK_AntiMalware.exe

  • reconnect_delay

    10000

  • registry_keyname

    ORK

  • taskscheduler_taskname

    ORK

  • watchdog_path

    AppData\ORK_Watchdog.exe

Targets

    • Target

      fd0adf2d624744c1d5bd260f3f74e70c_JaffaCakes118

    • Size

      4.0MB

    • MD5

      fd0adf2d624744c1d5bd260f3f74e70c

    • SHA1

      4a8ada06c927a7c02895d278f4144069933b4b16

    • SHA256

      696edfb0ae8b67205e48937ef8bcb54f02e46d94933f491d3e9c440d3e10f4da

    • SHA512

      800bbaef8df7596bc35c74ce8eb91852ed9ed893741417e43a8f3b51f284f4c4a53b81fd19b08284a245c9d5756c8601259a2c20530302236c70e52188785108

    • SSDEEP

      98304:/viz/27qWGq/TzuqCDl2Ptao7jveMGDL+DJPrONg:/viq75/TzufceP2KNg

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks