General

  • Target

    ce82a484a45a53282099937c6a655fbd9101f2ff89a69ffc101473a92615f722

  • Size

    913KB

  • Sample

    241206-bkn2vsxrgp

  • MD5

    da251d4a25d879b2b47d796b89a49bac

  • SHA1

    55e66cef9543175ada225d7efb9dbf00d8acc396

  • SHA256

    ce82a484a45a53282099937c6a655fbd9101f2ff89a69ffc101473a92615f722

  • SHA512

    7d75c3d90420fbcc21704c2ffae1cb37a136153b8712109232349722cc6e677341843f03960316d5a1be5904b591b1519d297a75701870606447f8ff381e2a96

  • SSDEEP

    24576:cVl64MROxnFL5bHKTlQzrZlI0AilFEvxHi8Sw:cVDMiPzrZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

192.168.31.232:10134

Mutex

9a0711938f32476b9cf4a8909df7bbe0

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\SYSTEM\Sys.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      ce82a484a45a53282099937c6a655fbd9101f2ff89a69ffc101473a92615f722

    • Size

      913KB

    • MD5

      da251d4a25d879b2b47d796b89a49bac

    • SHA1

      55e66cef9543175ada225d7efb9dbf00d8acc396

    • SHA256

      ce82a484a45a53282099937c6a655fbd9101f2ff89a69ffc101473a92615f722

    • SHA512

      7d75c3d90420fbcc21704c2ffae1cb37a136153b8712109232349722cc6e677341843f03960316d5a1be5904b591b1519d297a75701870606447f8ff381e2a96

    • SSDEEP

      24576:cVl64MROxnFL5bHKTlQzrZlI0AilFEvxHi8Sw:cVDMiPzrZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks