General

  • Target

    ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13

  • Size

    3.0MB

  • MD5

    85f6a170cdf61b577203880677cbfa2e

  • SHA1

    c8a3c321a34fa789e6ed85a48c745b25b99ad00c

  • SHA256

    ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13

  • SHA512

    aa8637302e6223f7027cbf190d18e352c6daa42ea0427880972fc4bccb3766f7a80005a5bc6accf7b79ea9d28034f65848fdfb6f11a9289e646bb43882dcc974

  • SSDEEP

    49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbm:ZLHTPJg8z1mKnypSbRxo9JCm

Score
10/10

Malware Config

Extracted

Family

orcus

Botnet

5

C2

31.44.184.52:10903

Mutex

sudo_kv8pk6zymgjja5xr21f12nkgke5xbmd3

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\dlejavascriptgenerator\linuxvm.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections