General
-
Target
a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82
-
Size
906KB
-
Sample
241110-b2b4mawgmq
-
MD5
b4eab1c810947a71db745d9c802c134d
-
SHA1
94e11ea5de995448854d07e8dc5a055356e07170
-
SHA256
a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82
-
SHA512
f7719dd7d552b7d332b44b42fe3342e9a697e63810f06b0479d41844f6c5772719694f50383a855b1aa5c0763a6f580340cb370c83e4b1716e3f0b11ced0494e
-
SSDEEP
24576:lVj4MROxnFdpSxXSlrrcI0AilFEvxHP87ool:lyMiZKSlrrcI0AilFEvxHP8
Behavioral task
behavioral1
Sample
a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82.exe
Resource
win7-20241010-en
Malware Config
Extracted
orcus
5.tcp.eu.ngrok.io:18995
d335d39a018a4cd1a94ec55fa8de7473
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82
-
Size
906KB
-
MD5
b4eab1c810947a71db745d9c802c134d
-
SHA1
94e11ea5de995448854d07e8dc5a055356e07170
-
SHA256
a239ad28abd1639ad0e918ed6a06a5b158bbf79e075352d3ac0c49b27189de82
-
SHA512
f7719dd7d552b7d332b44b42fe3342e9a697e63810f06b0479d41844f6c5772719694f50383a855b1aa5c0763a6f580340cb370c83e4b1716e3f0b11ced0494e
-
SSDEEP
24576:lVj4MROxnFdpSxXSlrrcI0AilFEvxHP87ool:lyMiZKSlrrcI0AilFEvxHP8
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-