General

  • Target

    f39d2fd8ade05fe148543b7f0ef29d50cc07e63f16ec68ebcbda78d254585102

  • Size

    915KB

  • Sample

    241130-bh1ymsvpdz

  • MD5

    19fa8a03adf350cd95bf2b1fc2573cda

  • SHA1

    eea30cdea85c3b4afc41ab4801920adc505b60a0

  • SHA256

    f39d2fd8ade05fe148543b7f0ef29d50cc07e63f16ec68ebcbda78d254585102

  • SHA512

    72316d36d0617b5607e4b04e29378262ad181d15541196745f1a6bbafff0cb0bd24c44249258ff9da0d3bea144e597fb876d0ba9a09147ebfa0dddfe6add296f

  • SSDEEP

    24576:YGq4MROxnFi37scrrcI0AilFEvxHPLoo9:YuMiogcrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

skr

C2

192.168.100.6:11111

Mutex

b3aa60325c6047f096cc62b26c15372c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    NvNodeLauncher_{B2F71952-0186-46C3-BAEC-A80AA35AC5B8}

  • taskscheduler_taskname

    NvNodeLauncher_{B8FV1952-S1Y6-46D3-B8EC-A8VAA355C5B8}

  • watchdog_path

    Temp\bcastdvr.exe

Targets

    • Target

      f39d2fd8ade05fe148543b7f0ef29d50cc07e63f16ec68ebcbda78d254585102

    • Size

      915KB

    • MD5

      19fa8a03adf350cd95bf2b1fc2573cda

    • SHA1

      eea30cdea85c3b4afc41ab4801920adc505b60a0

    • SHA256

      f39d2fd8ade05fe148543b7f0ef29d50cc07e63f16ec68ebcbda78d254585102

    • SHA512

      72316d36d0617b5607e4b04e29378262ad181d15541196745f1a6bbafff0cb0bd24c44249258ff9da0d3bea144e597fb876d0ba9a09147ebfa0dddfe6add296f

    • SSDEEP

      24576:YGq4MROxnFi37scrrcI0AilFEvxHPLoo9:YuMiogcrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks