General
-
Target
xd.exe
-
Size
3.0MB
-
Sample
241028-kef9havbpa
-
MD5
b8006a0ea8243be30ddbc2009aa05d93
-
SHA1
81df425e729edd90c7b7e50b995803da783557ef
-
SHA256
6895bec83e891c87783c0fd0a99f338205c8426d5cd0f2e298b22979e3e497f2
-
SHA512
4535e0547d479b58663dcc71dc49e7658438e79145cf0eb7d8748864209aa33fb35bf41d506ad527fc25132448c9800ca1cc8eff7568f5af4878da667ad462a4
-
SSDEEP
49152:6zTEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmNMrZEu:6zTtODUKTslWp2MpbfGGilIJPypSbxE8
Behavioral task
behavioral1
Sample
xd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
xd.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
xd.exe
Resource
win11-20241007-en
Malware Config
Extracted
orcus
89.23.100.155:1337
1ff7891fa0904651aeca5ed123954333
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
xd.exe
-
Size
3.0MB
-
MD5
b8006a0ea8243be30ddbc2009aa05d93
-
SHA1
81df425e729edd90c7b7e50b995803da783557ef
-
SHA256
6895bec83e891c87783c0fd0a99f338205c8426d5cd0f2e298b22979e3e497f2
-
SHA512
4535e0547d479b58663dcc71dc49e7658438e79145cf0eb7d8748864209aa33fb35bf41d506ad527fc25132448c9800ca1cc8eff7568f5af4878da667ad462a4
-
SSDEEP
49152:6zTEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmNMrZEu:6zTtODUKTslWp2MpbfGGilIJPypSbxE8
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1