General
-
Target
7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25
-
Size
924KB
-
Sample
241219-bfrbeszmc1
-
MD5
eb8463d0ce192dbc87e7bdb2f5530afd
-
SHA1
7012374f28429b0aa8ad469b9fe363466351545f
-
SHA256
7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25
-
SHA512
925dfdb9961030bea95c908d40c166b397bca410e0eba5c881fe810e3c3af604df332b556bba5ccc1c53e06b3c1d3b6a94fbde4d6b7c7d448ef78db9b9d29c69
-
SSDEEP
24576:bCC4MROxnFE3mi9rbEI0AilFEvxH44ooM:bKMiup9rbEI0AilFEvxH4
Behavioral task
behavioral1
Sample
7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
TEST_LEO_FAKE
0.0.0.0:1268
4b7e745d24cf405ca3d04bd10e33b1c6
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Windows_Defender\Defender.exe
-
reconnect_delay
10000
-
registry_keyname
W_Defender
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\Defender.exe
Targets
-
-
Target
7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25
-
Size
924KB
-
MD5
eb8463d0ce192dbc87e7bdb2f5530afd
-
SHA1
7012374f28429b0aa8ad469b9fe363466351545f
-
SHA256
7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25
-
SHA512
925dfdb9961030bea95c908d40c166b397bca410e0eba5c881fe810e3c3af604df332b556bba5ccc1c53e06b3c1d3b6a94fbde4d6b7c7d448ef78db9b9d29c69
-
SSDEEP
24576:bCC4MROxnFE3mi9rbEI0AilFEvxH44ooM:bKMiup9rbEI0AilFEvxH4
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-