General
-
Target
ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13
-
Size
3.0MB
-
Sample
241205-bkseaazrgs
-
MD5
85f6a170cdf61b577203880677cbfa2e
-
SHA1
c8a3c321a34fa789e6ed85a48c745b25b99ad00c
-
SHA256
ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13
-
SHA512
aa8637302e6223f7027cbf190d18e352c6daa42ea0427880972fc4bccb3766f7a80005a5bc6accf7b79ea9d28034f65848fdfb6f11a9289e646bb43882dcc974
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbm:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13.exe
Resource
win7-20241010-en
Malware Config
Extracted
orcus
5
31.44.184.52:10903
sudo_kv8pk6zymgjja5xr21f12nkgke5xbmd3
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\dlejavascriptgenerator\linuxvm.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13
-
Size
3.0MB
-
MD5
85f6a170cdf61b577203880677cbfa2e
-
SHA1
c8a3c321a34fa789e6ed85a48c745b25b99ad00c
-
SHA256
ecb3e391ce8ec8e598e4b0353f031e895f038a707d54a42caa93011cbc860d13
-
SHA512
aa8637302e6223f7027cbf190d18e352c6daa42ea0427880972fc4bccb3766f7a80005a5bc6accf7b79ea9d28034f65848fdfb6f11a9289e646bb43882dcc974
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbm:ZLHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1