General
-
Target
f6165d4307d292ab5f69689aad2b3eea87d9b6189ff67c674067861f70976141
-
Size
917KB
-
Sample
241023-bhds4svgmn
-
MD5
418ca841dfb9904c3c5c07b0b4a8cc22
-
SHA1
485b466fa3e7d45a693fe0cae66a4fa806d43d70
-
SHA256
f6165d4307d292ab5f69689aad2b3eea87d9b6189ff67c674067861f70976141
-
SHA512
0a8e96cd384b71f16a4c9d6f9069ad4f89271ca66c42cc54247cd0c66a0cbdeff097893b555d4d39ae81a09c50fa7384dedf09d5438655f70d0eccd38ef488c8
-
SSDEEP
24576:FmHR4MROxnF53ozrrcI0AilFEvxHPTIooo:MuMi7ozrrcI0AilFEvxHPT
Behavioral task
behavioral1
Sample
f6165d4307d292ab5f69689aad2b3eea87d9b6189ff67c674067861f70976141.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
45.200.148.205:10134
ac5a4ebd7b5f431aa47967ded2179f16
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\sysreqfiles\winhost.exe
-
reconnect_delay
10000
-
registry_keyname
winhost
-
taskscheduler_taskname
winhost.
-
watchdog_path
AppData\winhosterf.exe
Targets
-
-
Target
f6165d4307d292ab5f69689aad2b3eea87d9b6189ff67c674067861f70976141
-
Size
917KB
-
MD5
418ca841dfb9904c3c5c07b0b4a8cc22
-
SHA1
485b466fa3e7d45a693fe0cae66a4fa806d43d70
-
SHA256
f6165d4307d292ab5f69689aad2b3eea87d9b6189ff67c674067861f70976141
-
SHA512
0a8e96cd384b71f16a4c9d6f9069ad4f89271ca66c42cc54247cd0c66a0cbdeff097893b555d4d39ae81a09c50fa7384dedf09d5438655f70d0eccd38ef488c8
-
SSDEEP
24576:FmHR4MROxnF53ozrrcI0AilFEvxHPTIooo:MuMi7ozrrcI0AilFEvxHPT
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1