General

  • Target

    a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82

  • Size

    906KB

  • Sample

    241110-b2b4mawgmq

  • MD5

    b4eab1c810947a71db745d9c802c134d

  • SHA1

    94e11ea5de995448854d07e8dc5a055356e07170

  • SHA256

    a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82

  • SHA512

    f7719dd7d552b7d332b44b42fe3342e9a697e63810f06b0479d41844f6c5772719694f50383a855b1aa5c0763a6f580340cb370c83e4b1716e3f0b11ced0494e

  • SSDEEP

    24576:lVj4MROxnFdpSxXSlrrcI0AilFEvxHP87ool:lyMiZKSlrrcI0AilFEvxHP8

Malware Config

Extracted

Family

orcus

C2

5.tcp.eu.ngrok.io:18995

Mutex

d335d39a018a4cd1a94ec55fa8de7473

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82

    • Size

      906KB

    • MD5

      b4eab1c810947a71db745d9c802c134d

    • SHA1

      94e11ea5de995448854d07e8dc5a055356e07170

    • SHA256

      a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82

    • SHA512

      f7719dd7d552b7d332b44b42fe3342e9a697e63810f06b0479d41844f6c5772719694f50383a855b1aa5c0763a6f580340cb370c83e4b1716e3f0b11ced0494e

    • SSDEEP

      24576:lVj4MROxnFdpSxXSlrrcI0AilFEvxHP87ool:lyMiZKSlrrcI0AilFEvxHP8

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks