General
-
Target
708e7acb7c1128f41a8fe1fe3ec2133d6ed6cc1a59a3d9298b955379facf9457
-
Size
3.0MB
-
Sample
241017-b8dk2awbph
-
MD5
32f2d9d84781dbd3878560510eafc718
-
SHA1
98ee728e99c4cf6e4eeed95f4e15f6107577ce64
-
SHA256
708e7acb7c1128f41a8fe1fe3ec2133d6ed6cc1a59a3d9298b955379facf9457
-
SHA512
8d65fce2e9adc13f022dfaddd1ea828e5fc86f7218134f72eadd9869266d34153d422f4ccb26e85df1fc34cc69e43f337bb27e36e034637bed1b7d7862ffe13b
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
708e7acb7c1128f41a8fe1fe3ec2133d6ed6cc1a59a3d9298b955379facf9457.exe
Resource
win7-20240708-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:52518
sudo_yg00jnz548xhwu1fpz52ok4lpvs7in6f
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\phptest\generatorwp.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
708e7acb7c1128f41a8fe1fe3ec2133d6ed6cc1a59a3d9298b955379facf9457
-
Size
3.0MB
-
MD5
32f2d9d84781dbd3878560510eafc718
-
SHA1
98ee728e99c4cf6e4eeed95f4e15f6107577ce64
-
SHA256
708e7acb7c1128f41a8fe1fe3ec2133d6ed6cc1a59a3d9298b955379facf9457
-
SHA512
8d65fce2e9adc13f022dfaddd1ea828e5fc86f7218134f72eadd9869266d34153d422f4ccb26e85df1fc34cc69e43f337bb27e36e034637bed1b7d7862ffe13b
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-