General

  • Target

    7d0eb9dc847ec28213299691c76677a023696d7357f3cbf63a43531f436313cc

  • Size

    986KB

  • Sample

    241129-bednyasphp

  • MD5

    f4cc5f812d038c702051b7026f67ec65

  • SHA1

    bc26685023eddc1e6a82ee6ebe52d7c1bcb14cda

  • SHA256

    7d0eb9dc847ec28213299691c76677a023696d7357f3cbf63a43531f436313cc

  • SHA512

    f953fe57a35d88063ac2a25e9629f6f3953bf7678b5cbdde0ac66928bdc671a2f43a0b8d81dd74ccfb01f24867456f2462f783d023da09dee72acd0f78210058

  • SSDEEP

    24576:Dsc04MROxnFF637U6rrcI0AilFEvxHP4Choon:QeMibK7U6rrcI0AilFEvxHP4

Malware Config

Extracted

Family

orcus

Botnet

solara

C2

212.15.49.233:5050

Mutex

094a584ddb794dbe9ff094ec5bbdb4d1

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    SystemSettings

  • taskscheduler_taskname

    UserOOBEBroker

  • watchdog_path

    AppData\taskhostw.exe

Targets

    • Target

      7d0eb9dc847ec28213299691c76677a023696d7357f3cbf63a43531f436313cc

    • Size

      986KB

    • MD5

      f4cc5f812d038c702051b7026f67ec65

    • SHA1

      bc26685023eddc1e6a82ee6ebe52d7c1bcb14cda

    • SHA256

      7d0eb9dc847ec28213299691c76677a023696d7357f3cbf63a43531f436313cc

    • SHA512

      f953fe57a35d88063ac2a25e9629f6f3953bf7678b5cbdde0ac66928bdc671a2f43a0b8d81dd74ccfb01f24867456f2462f783d023da09dee72acd0f78210058

    • SSDEEP

      24576:Dsc04MROxnFF637U6rrcI0AilFEvxHP4Choon:QeMibK7U6rrcI0AilFEvxHP4

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks