General

  • Target

    7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e

  • Size

    5.0MB

  • Sample

    241207-be148stkel

  • MD5

    14fb495cc853da2b1bab0ef9ad8ea15f

  • SHA1

    b6d6589a7a5638c50cbd6cf6482c31db3f941fec

  • SHA256

    7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e

  • SHA512

    a97cf03fe6c59fb334d57c6dc3f5aca28f80ab3d3b3a89ec9d1f5e08d856ca0d5da8e8eedbe469c31d0a9d3aba8a5a90772d76abf386951d402bab94124b8081

  • SSDEEP

    24576:nEu4MROxnFe3idtrrcI0AilFEvxHPfmoo6:nIMiwkrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

Test Hack

C2

127.0.0.1:10134

Mutex

de4e6099f84e48d89e40ea74092aa6a9

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\HDAudioDriver\HDAudioDriver.exe

  • reconnect_delay

    10000

  • registry_keyname

    Realtek_audio_driver

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    Temp\chrome.exe

Targets

    • Target

      7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e

    • Size

      5.0MB

    • MD5

      14fb495cc853da2b1bab0ef9ad8ea15f

    • SHA1

      b6d6589a7a5638c50cbd6cf6482c31db3f941fec

    • SHA256

      7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e

    • SHA512

      a97cf03fe6c59fb334d57c6dc3f5aca28f80ab3d3b3a89ec9d1f5e08d856ca0d5da8e8eedbe469c31d0a9d3aba8a5a90772d76abf386951d402bab94124b8081

    • SSDEEP

      24576:nEu4MROxnFe3idtrrcI0AilFEvxHPfmoo6:nIMiwkrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks