General

  • Target

    9d053e2bc0db1f6af6c3a840fc3004b31a4be7f8b807e703a502dce3bb8f7d3e

  • Size

    924KB

  • Sample

    241109-bwacvavalj

  • MD5

    a7fe2256e4b0da68f7b1f004576b210b

  • SHA1

    21e736033e137d90b13c33a492095daf1bbf7ab8

  • SHA256

    9d053e2bc0db1f6af6c3a840fc3004b31a4be7f8b807e703a502dce3bb8f7d3e

  • SHA512

    c0b52b4de0b82302fed5f0eaa7e596f8fa656d1872516f1110ac0b29d7a96dc3afc437cd161f58c48da4f9277fb2dbcb1680f4edf0f468cf11e5e64b6ba8680e

  • SSDEEP

    24576:SGq4MROxnFE33O3urrcI0AilFEvxHPjooz:SuMiuMurrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

194.226.169.3:1337

Mutex

616472cdd55f4e95988997971c371b81

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\svchost.exe

Targets

    • Target

      9d053e2bc0db1f6af6c3a840fc3004b31a4be7f8b807e703a502dce3bb8f7d3e

    • Size

      924KB

    • MD5

      a7fe2256e4b0da68f7b1f004576b210b

    • SHA1

      21e736033e137d90b13c33a492095daf1bbf7ab8

    • SHA256

      9d053e2bc0db1f6af6c3a840fc3004b31a4be7f8b807e703a502dce3bb8f7d3e

    • SHA512

      c0b52b4de0b82302fed5f0eaa7e596f8fa656d1872516f1110ac0b29d7a96dc3afc437cd161f58c48da4f9277fb2dbcb1680f4edf0f468cf11e5e64b6ba8680e

    • SSDEEP

      24576:SGq4MROxnFE33O3urrcI0AilFEvxHPjooz:SuMiuMurrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks