General
-
Target
xdrt.exe
-
Size
3.0MB
-
Sample
241026-275aga1fkn
-
MD5
5b6c7b03ad1cf493281271a472dc6b2e
-
SHA1
edd7fc71647f2713c68391fb8b53488621d2c903
-
SHA256
9c5bedeffdd2f742124a0c081694eea2786a7bf4f9c7963a267aca508ea60f09
-
SHA512
3e0fee4c651c5fea933266822f6ff83143f8233a40885640349173e1ab386e06541b92cc522987120adbc5d1c665c9402099f0e5c594cb146d93c00f6e599747
-
SSDEEP
49152:tNJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXwrZz:tNJtODUKTslWp2MpbfGGilIJPypSbxEw
Behavioral task
behavioral1
Sample
xdrt.exe
Resource
win11-20241007-en
Malware Config
Extracted
orcus
6.tcp.eu.ngrok.io:10004
48cde11ddaf84e58b38e0cc8461c97c5
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
xdrt.exe
-
Size
3.0MB
-
MD5
5b6c7b03ad1cf493281271a472dc6b2e
-
SHA1
edd7fc71647f2713c68391fb8b53488621d2c903
-
SHA256
9c5bedeffdd2f742124a0c081694eea2786a7bf4f9c7963a267aca508ea60f09
-
SHA512
3e0fee4c651c5fea933266822f6ff83143f8233a40885640349173e1ab386e06541b92cc522987120adbc5d1c665c9402099f0e5c594cb146d93c00f6e599747
-
SSDEEP
49152:tNJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXwrZz:tNJtODUKTslWp2MpbfGGilIJPypSbxEw
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Executes dropped EXE
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4