General
-
Target
ee1f504b516b101a9d08e411e9e02391962732280a22e96fcb6e0730fa5619ea
-
Size
3.0MB
-
Sample
241110-byr1nswhmh
-
MD5
7a624c44e8be165b539f4604c2181f65
-
SHA1
0d9744ad8752b59d872eeb24abe92835ef793c58
-
SHA256
ee1f504b516b101a9d08e411e9e02391962732280a22e96fcb6e0730fa5619ea
-
SHA512
e1b47d0b048058a260c3c183083ac4643a76edd6eb969558eb05d46312cf9ad8c1961f823d40fadfddec630d5ea0290b835bdae7d654f77d48e7067a6416e467
-
SSDEEP
49152:Y1HS7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpbu/nRFfjI7L0qb:YUHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
ee1f504b516b101a9d08e411e9e02391962732280a22e96fcb6e0730fa5619ea.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:12708
sudo_u1r2jdrjb1fc5k3jeo9fv58lnpfbyogh
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\universaltrack\longpolleternal.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
ee1f504b516b101a9d08e411e9e02391962732280a22e96fcb6e0730fa5619ea
-
Size
3.0MB
-
MD5
7a624c44e8be165b539f4604c2181f65
-
SHA1
0d9744ad8752b59d872eeb24abe92835ef793c58
-
SHA256
ee1f504b516b101a9d08e411e9e02391962732280a22e96fcb6e0730fa5619ea
-
SHA512
e1b47d0b048058a260c3c183083ac4643a76edd6eb969558eb05d46312cf9ad8c1961f823d40fadfddec630d5ea0290b835bdae7d654f77d48e7067a6416e467
-
SSDEEP
49152:Y1HS7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpbu/nRFfjI7L0qb:YUHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-