General

  • Target

    a0d40ca195ecfebfd36feefb12811ec4dcf3c643cd0658456503bb0f98e788e3.exe

  • Size

    3.0MB

  • Sample

    241203-w4q1saxpas

  • MD5

    d24b87f97188836791caaa09229fd0e3

  • SHA1

    e911bee049bd97522e888d3075d2e74b06e57d73

  • SHA256

    a0d40ca195ecfebfd36feefb12811ec4dcf3c643cd0658456503bb0f98e788e3

  • SHA512

    b38fb1399f51a0e5e3f1aed34b6d88039e0101262f24559adfe7b2337bbec415fd29af3c3216f1337f834ae65b7199d4ed9a0b20ef68be69e3a5551334bbbc04

  • SSDEEP

    49152:O3X27p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpEu/nRFfjI7L0qba:OWHTPJg8z1mKnypSbRxo9JCmR

Malware Config

Extracted

Family

orcus

Botnet

newreborn

C2

31.44.184.52:10903

Mutex

sudo_h7y6k5gabf3ov892gnvzdzpr7kydnery

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\dlejavascriptgenerator\javascripteternal.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      a0d40ca195ecfebfd36feefb12811ec4dcf3c643cd0658456503bb0f98e788e3.exe

    • Size

      3.0MB

    • MD5

      d24b87f97188836791caaa09229fd0e3

    • SHA1

      e911bee049bd97522e888d3075d2e74b06e57d73

    • SHA256

      a0d40ca195ecfebfd36feefb12811ec4dcf3c643cd0658456503bb0f98e788e3

    • SHA512

      b38fb1399f51a0e5e3f1aed34b6d88039e0101262f24559adfe7b2337bbec415fd29af3c3216f1337f834ae65b7199d4ed9a0b20ef68be69e3a5551334bbbc04

    • SSDEEP

      49152:O3X27p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpEu/nRFfjI7L0qba:OWHTPJg8z1mKnypSbRxo9JCmR

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks