General
-
Target
798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5.exe
-
Size
3.0MB
-
Sample
241113-v3xw9svrdt
-
MD5
b1783b5a739fb2ee07fb87079512bedb
-
SHA1
c495cbbe22bb4c41678ff7270deeced852e3f05d
-
SHA256
798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5
-
SHA512
fbae6175251cac2552dde1c4d7551ebf4bc0ba357514e3923f3f1a698aa097a5088c852cd88d9736f2994187d2b454fd24e23fabf6186b0a57d56aa133dcd04f
-
SSDEEP
49152:4i9R1/op1fAZeM9/NtRaO5NYAxC48VYrJAypQxbn32o9JnCmxJWncFfSIH4DuisN:4EMtQR9TYW8V0OypSbGo9JCmxj
Behavioral task
behavioral1
Sample
798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
45.10.151.182:10134
064acb3fed56475eaee5e20cdd2d83c3
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
svchost
-
taskscheduler_taskname
svchost
-
watchdog_path
AppData\csrss.exe
Targets
-
-
Target
798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5.exe
-
Size
3.0MB
-
MD5
b1783b5a739fb2ee07fb87079512bedb
-
SHA1
c495cbbe22bb4c41678ff7270deeced852e3f05d
-
SHA256
798818f34937ddd744c17c792ff1203f462dbda822553b3286522337575ea5d5
-
SHA512
fbae6175251cac2552dde1c4d7551ebf4bc0ba357514e3923f3f1a698aa097a5088c852cd88d9736f2994187d2b454fd24e23fabf6186b0a57d56aa133dcd04f
-
SSDEEP
49152:4i9R1/op1fAZeM9/NtRaO5NYAxC48VYrJAypQxbn32o9JnCmxJWncFfSIH4DuisN:4EMtQR9TYW8V0OypSbGo9JCmxj
-
Orcus family
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-