General

  • Target

    Sigma.exe

  • Size

    839KB

  • Sample

    241126-ykbsvstjbm

  • MD5

    d82971472daf0f83934006c25abb88f4

  • SHA1

    85178be08ca3583d530a87ea789e9ae4a9490c17

  • SHA256

    cc9879ba8143f1ee15fd5400ea6632da1337970111467c362d7f0695c71d04d2

  • SHA512

    a4210167fc7c02508e708ee12bd52876413425046496fdeccd2a0313cf1260f651411a35cc2a6e5b65a30f5542aae75f1d1741d616ff79f93a48d9669e61e42f

  • SSDEEP

    24576:bBS04YNEMuExDiU6E5R9s8xY/2l/dGtnIbt+r7:bj4auS+UjfU2TGdIbt+r

Malware Config

Extracted

Family

orcus

C2

?during-interesting.gl.at.ply.gg

Mutex

0b0ed56823694943a3c179d3184d2bd4

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    11/26/2024 11:40:25

  • plugins

    AgEAAA==

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_name

    Audio HD Driver

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Targets

    • Target

      Sigma.exe

    • Size

      839KB

    • MD5

      d82971472daf0f83934006c25abb88f4

    • SHA1

      85178be08ca3583d530a87ea789e9ae4a9490c17

    • SHA256

      cc9879ba8143f1ee15fd5400ea6632da1337970111467c362d7f0695c71d04d2

    • SHA512

      a4210167fc7c02508e708ee12bd52876413425046496fdeccd2a0313cf1260f651411a35cc2a6e5b65a30f5542aae75f1d1741d616ff79f93a48d9669e61e42f

    • SSDEEP

      24576:bBS04YNEMuExDiU6E5R9s8xY/2l/dGtnIbt+r7:bj4auS+UjfU2TGdIbt+r

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks