Behavioral task
behavioral1
Sample
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
Resource
win10v2004-20241007-en
General
-
Target
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768
-
Size
3.0MB
-
MD5
55aa8f71dd8e53e8272802adbcfcb2b6
-
SHA1
b02f77ad4283f160b4702205d2107187a6897c54
-
SHA256
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768
-
SHA512
2301db40956d529233e4c47668366cad91c2a77c2589a78c08e1e051f4bb6b609f56e2f8980a7672bf4eb7f837262f03897540eb1bef8986665cad3da736e2db
-
SSDEEP
49152:o+fEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmkcrZEu:o+ftODUKTslWp2MpbfGGilIJPypSbxEW
Malware Config
Extracted
orcus
192.168.0.13:7777
cac037bbf0124b2d97ed82751fc96538
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768
Files
-
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ