General

  • Target

    die.exe

  • Size

    3.0MB

  • Sample

    241120-akrx3swhkp

  • MD5

    e0e9f2b50bfa42d18679c8c0b429cddd

  • SHA1

    b7f28f076a3d109396380bf85bfb732fa45b7901

  • SHA256

    dad9c156fb5562b5ca6a3fc66ce92d0435091a0444448633a8d8d0e7caee6534

  • SHA512

    d5cfbe7977b6b0fbdcc1326065976b3cefac3b1f5d0e7b013d96d5967dd8288e5f612f02aca45869a817752331bef98ee6358251b139ce1d6606a2609005e3fa

  • SSDEEP

    49152:eNODf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmsWncFf0I74gu3KM:egyb2MnjQBEUNypSb6o9JCm

Malware Config

Extracted

Family

orcus

C2

10.211.55.25:10134

Mutex

0d5c4caa686e4bf1a077d8b4011ad8f2

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      die.exe

    • Size

      3.0MB

    • MD5

      e0e9f2b50bfa42d18679c8c0b429cddd

    • SHA1

      b7f28f076a3d109396380bf85bfb732fa45b7901

    • SHA256

      dad9c156fb5562b5ca6a3fc66ce92d0435091a0444448633a8d8d0e7caee6534

    • SHA512

      d5cfbe7977b6b0fbdcc1326065976b3cefac3b1f5d0e7b013d96d5967dd8288e5f612f02aca45869a817752331bef98ee6358251b139ce1d6606a2609005e3fa

    • SSDEEP

      49152:eNODf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmsWncFf0I74gu3KM:egyb2MnjQBEUNypSb6o9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks