General

  • Target

    72328a364b47db12bac7aa536cf3cb4c10c08712f762b8d85ce9307f45f2a7dc

  • Size

    3.0MB

  • Sample

    241214-bktx4stqfm

  • MD5

    595866ce3023aa7a94a221bcff8bfe15

  • SHA1

    f1f8c080b238b7ea66d0d42732268fca9ae77364

  • SHA256

    72328a364b47db12bac7aa536cf3cb4c10c08712f762b8d85ce9307f45f2a7dc

  • SHA512

    75a406fdb7b862786f9ad402ca475affad57393d604669b2912db5cca3193f538f4fa5512d5f1524bdff4006cacd0ec664b5451f18a292ae2f34e2686f2d5308

  • SSDEEP

    49152:zkt1ZeM9/3EgHcyH4Z9fVTB4krLzS+HAypQxbOqUo9JnCmOK1IZfKGnlFr5Ixnc7:zktGjzD5rfLgypSbKo9JCm01n

Malware Config

Extracted

Family

orcus

Botnet

Standoff

C2

vimeworldserverstat.serveminecraft.net:3306

Mutex

578e841011a443d284fea21232fbf3a6

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Syncing metadata\Explorer.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Explorer

  • watchdog_path

    AppData\Node S2-N.exe

Targets

    • Target

      72328a364b47db12bac7aa536cf3cb4c10c08712f762b8d85ce9307f45f2a7dc

    • Size

      3.0MB

    • MD5

      595866ce3023aa7a94a221bcff8bfe15

    • SHA1

      f1f8c080b238b7ea66d0d42732268fca9ae77364

    • SHA256

      72328a364b47db12bac7aa536cf3cb4c10c08712f762b8d85ce9307f45f2a7dc

    • SHA512

      75a406fdb7b862786f9ad402ca475affad57393d604669b2912db5cca3193f538f4fa5512d5f1524bdff4006cacd0ec664b5451f18a292ae2f34e2686f2d5308

    • SSDEEP

      49152:zkt1ZeM9/3EgHcyH4Z9fVTB4krLzS+HAypQxbOqUo9JnCmOK1IZfKGnlFr5Ixnc7:zktGjzD5rfLgypSbKo9JCm01n

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks