General

  • Target

    e2c97f6df88c5b588867c5a4c9c260a0a295157b7c0f9cd87c3be07c2ef87bf6

  • Size

    917KB

  • Sample

    241030-b5apzathkn

  • MD5

    039debd99027407f731d115001b806c7

  • SHA1

    7ee0fab4884c61693628691f8c7efc381c5336c2

  • SHA256

    e2c97f6df88c5b588867c5a4c9c260a0a295157b7c0f9cd87c3be07c2ef87bf6

  • SHA512

    fdcbbcef6117c65f74d21ae8a1cb2cf6730f395ce57805b205845dba5dac6e56df9c81dc72f91a96c32e241c85c1cacfcb53ac739ca1c92fc8ab8106b555afc1

  • SSDEEP

    24576:9eu4MROxnFH3qkTZ2rZlI0AilFEvxHilI+:9etMihMrZlI0AilFEvxHil

Malware Config

Extracted

Family

orcus

Botnet

Retard

C2

detoxify-21656.portmap.host:35923

Mutex

d4ac76608be445ca91ed380bdd064484

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    C:\Windows\syscon.exe

  • reconnect_delay

    10000

  • registry_keyname

    svchost.exe

  • taskscheduler_taskname

    conhost.exe

  • watchdog_path

    AppData\svchost.exe

Targets

    • Target

      e2c97f6df88c5b588867c5a4c9c260a0a295157b7c0f9cd87c3be07c2ef87bf6

    • Size

      917KB

    • MD5

      039debd99027407f731d115001b806c7

    • SHA1

      7ee0fab4884c61693628691f8c7efc381c5336c2

    • SHA256

      e2c97f6df88c5b588867c5a4c9c260a0a295157b7c0f9cd87c3be07c2ef87bf6

    • SHA512

      fdcbbcef6117c65f74d21ae8a1cb2cf6730f395ce57805b205845dba5dac6e56df9c81dc72f91a96c32e241c85c1cacfcb53ac739ca1c92fc8ab8106b555afc1

    • SSDEEP

      24576:9eu4MROxnFH3qkTZ2rZlI0AilFEvxHilI+:9etMihMrZlI0AilFEvxHil

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks