General

  • Target

    798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5.exe

  • Size

    3.0MB

  • Sample

    241113-v3xw9svrdt

  • MD5

    b1783b5a739fb2ee07fb87079512bedb

  • SHA1

    c495cbbe22bb4c41678ff7270deeced852e3f05d

  • SHA256

    798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5

  • SHA512

    fbae6175251cac2552dde1c4d7551ebf4bc0ba357514e3923f3f1a698aa097a5088c852cd88d9736f2994187d2b454fd24e23fabf6186b0a57d56aa133dcd04f

  • SSDEEP

    49152:4i9R1/op1fAZeM9/NtRaO5NYAxC48VYrJAypQxbn32o9JnCmxJWncFfSIH4DuisN:4EMtQR9TYW8V0OypSbGo9JCmxj

Malware Config

Extracted

Family

orcus

C2

45.10.151.182:10134

Mutex

064acb3fed56475eaee5e20cdd2d83c3

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    svchost

  • taskscheduler_taskname

    svchost

  • watchdog_path

    AppData\csrss.exe

Targets

    • Target

      798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5.exe

    • Size

      3.0MB

    • MD5

      b1783b5a739fb2ee07fb87079512bedb

    • SHA1

      c495cbbe22bb4c41678ff7270deeced852e3f05d

    • SHA256

      798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5

    • SHA512

      fbae6175251cac2552dde1c4d7551ebf4bc0ba357514e3923f3f1a698aa097a5088c852cd88d9736f2994187d2b454fd24e23fabf6186b0a57d56aa133dcd04f

    • SSDEEP

      49152:4i9R1/op1fAZeM9/NtRaO5NYAxC48VYrJAypQxbn32o9JnCmxJWncFfSIH4DuisN:4EMtQR9TYW8V0OypSbGo9JCmxj

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks