General

  • Target

    7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25

  • Size

    924KB

  • Sample

    241219-bfrbeszmc1

  • MD5

    eb8463d0ce192dbc87e7bdb2f5530afd

  • SHA1

    7012374f28429b0aa8ad469b9fe363466351545f

  • SHA256

    7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25

  • SHA512

    925dfdb9961030bea95c908d40c166b397bca410e0eba5c881fe810e3c3af604df332b556bba5ccc1c53e06b3c1d3b6a94fbde4d6b7c7d448ef78db9b9d29c69

  • SSDEEP

    24576:bCC4MROxnFE3mi9rbEI0AilFEvxH44ooM:bKMiup9rbEI0AilFEvxH4

Malware Config

Extracted

Family

orcus

Botnet

TEST_LEO_FAKE

C2

0.0.0.0:1268

Mutex

4b7e745d24cf405ca3d04bd10e33b1c6

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Windows_Defender\Defender.exe

  • reconnect_delay

    10000

  • registry_keyname

    W_Defender

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\Defender.exe

Targets

    • Target

      7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25

    • Size

      924KB

    • MD5

      eb8463d0ce192dbc87e7bdb2f5530afd

    • SHA1

      7012374f28429b0aa8ad469b9fe363466351545f

    • SHA256

      7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25

    • SHA512

      925dfdb9961030bea95c908d40c166b397bca410e0eba5c881fe810e3c3af604df332b556bba5ccc1c53e06b3c1d3b6a94fbde4d6b7c7d448ef78db9b9d29c69

    • SSDEEP

      24576:bCC4MROxnFE3mi9rbEI0AilFEvxH44ooM:bKMiup9rbEI0AilFEvxH4

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks