General

  • Target

    xdrt.exe

  • Size

    3.0MB

  • Sample

    241026-275aga1fkn

  • MD5

    5b6c7b03ad1cf493281271a472dc6b2e

  • SHA1

    edd7fc71647f2713c68391fb8b53488621d2c903

  • SHA256

    9c5bedeffdd2f742124a0c081694eea2786a7bf4f9c7963a267aca508ea60f09

  • SHA512

    3e0fee4c651c5fea933266822f6ff83143f8233a40885640349173e1ab386e06541b92cc522987120adbc5d1c665c9402099f0e5c594cb146d93c00f6e599747

  • SSDEEP

    49152:tNJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXwrZz:tNJtODUKTslWp2MpbfGGilIJPypSbxEw

Malware Config

Extracted

Family

orcus

C2

6.tcp.eu.ngrok.io:10004

Mutex

48cde11ddaf84e58b38e0cc8461c97c5

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      xdrt.exe

    • Size

      3.0MB

    • MD5

      5b6c7b03ad1cf493281271a472dc6b2e

    • SHA1

      edd7fc71647f2713c68391fb8b53488621d2c903

    • SHA256

      9c5bedeffdd2f742124a0c081694eea2786a7bf4f9c7963a267aca508ea60f09

    • SHA512

      3e0fee4c651c5fea933266822f6ff83143f8233a40885640349173e1ab386e06541b92cc522987120adbc5d1c665c9402099f0e5c594cb146d93c00f6e599747

    • SSDEEP

      49152:tNJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXwrZz:tNJtODUKTslWp2MpbfGGilIJPypSbxEw

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • UAC bypass

    • Orcurs Rat Executable

    • Executes dropped EXE

    • Windows security modification

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks