General
-
Target
0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34
-
Size
916KB
-
Sample
241206-bhn9vaxqgp
-
MD5
4126e7553a9d344cec8d0c689b96e7a0
-
SHA1
34f3aadb036869a07cf62df102a0fb89d675ee5a
-
SHA256
0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34
-
SHA512
66c723e19830eddb168a169e9d1d78f386415d72a0d43f71a21edae4982f12c8983f204510d3170024db250db755debc03dd6da86b151fe87d9d3a2e9eed52ea
-
SSDEEP
12288:n5STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawhmL9kgWrprZNrI0AilFEvxHvBMO:xhg4MROxnF/1irZlI0AilFEvxHiFo
Behavioral task
behavioral1
Sample
0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
127.0.0.1:21726
0bc32d4160a24c468470912a114f3da6
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\SYS\Svchost.exe
-
reconnect_delay
10000
-
registry_keyname
Discord
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34
-
Size
916KB
-
MD5
4126e7553a9d344cec8d0c689b96e7a0
-
SHA1
34f3aadb036869a07cf62df102a0fb89d675ee5a
-
SHA256
0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34
-
SHA512
66c723e19830eddb168a169e9d1d78f386415d72a0d43f71a21edae4982f12c8983f204510d3170024db250db755debc03dd6da86b151fe87d9d3a2e9eed52ea
-
SSDEEP
12288:n5STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawhmL9kgWrprZNrI0AilFEvxHvBMO:xhg4MROxnF/1irZlI0AilFEvxHiFo
Score10/10-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-