Behavioral task
behavioral1
Sample
3d13f31953c9ce3374a8c532bede16472856662483579f0c272524b44339a8c3.exe
Resource
win7-20241010-en
General
-
Target
3d13f31953c9ce3374a8c532bede16472856662483579f0c272524b44339a8c3
-
Size
948KB
-
MD5
9a4bac03af84b7174da19ae8d87684ce
-
SHA1
1da689279ce3746dcdd8ed0b68c868d666eca2fb
-
SHA256
3d13f31953c9ce3374a8c532bede16472856662483579f0c272524b44339a8c3
-
SHA512
37e91b7695e2fd6ac3ab71bdf487686512e461a47a78adee6a13ff48c59a51f168cce1ce8397909cddeade050e8ece734f90bb0e82a0190e1481b1fcb7b6bc2b
-
SSDEEP
24576:cU04MROxnFTOVrrcI0AilFEvxHPR2ooVb:cmMi18rrcI0AilFEvxHP
Malware Config
Extracted
orcus
b7fscoc.localto.net:8935
cf06369f7b98472f97643448b3df76ba
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\Roaming\am1\RuntimeBroker.exe
-
reconnect_delay
10000
-
registry_keyname
RuntimeBroker
-
taskscheduler_taskname
RuntimeBroker
-
watchdog_path
AppData\Runtime.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
Processes:
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3d13f31953c9ce3374a8c532bede16472856662483579f0c272524b44339a8c3
Files
-
3d13f31953c9ce3374a8c532bede16472856662483579f0c272524b44339a8c3.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 899KB - Virtual size: 898KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ