Resubmissions

11-12-2024 01:48

241211-b75ccszlhx 10

General

  • Target

    test.exe

  • Size

    903KB

  • Sample

    241211-b75ccszlhx

  • MD5

    355df37589243785512812437ef1d4b2

  • SHA1

    45fae5fd1ce1aa7f1c239489a3e0db5ab0606128

  • SHA256

    3bfd1e4cae067297ea03292efbae3f59961453c71a0898433b47961771728544

  • SHA512

    e1d1c1a3b9569f55247583d0a70458d957d779a696177d61cd5daff31f5372cf1c0bc81272809c90e991bdefbe9e15e4a5b00bcf59f90028588f8157a7feeb64

  • SSDEEP

    12288:b8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBS:I3s4MROxnF9LqrZlI0AilFEvxHiko

Malware Config

Extracted

Family

orcus

C2

147.185.221.24:4580

Mutex

a339b99dac7845378c88498c7cef7ac5

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      test.exe

    • Size

      903KB

    • MD5

      355df37589243785512812437ef1d4b2

    • SHA1

      45fae5fd1ce1aa7f1c239489a3e0db5ab0606128

    • SHA256

      3bfd1e4cae067297ea03292efbae3f59961453c71a0898433b47961771728544

    • SHA512

      e1d1c1a3b9569f55247583d0a70458d957d779a696177d61cd5daff31f5372cf1c0bc81272809c90e991bdefbe9e15e4a5b00bcf59f90028588f8157a7feeb64

    • SSDEEP

      12288:b8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBS:I3s4MROxnF9LqrZlI0AilFEvxHiko

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks