General

  • Target

    7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25

  • Size

    924KB

  • MD5

    eb8463d0ce192dbc87e7bdb2f5530afd

  • SHA1

    7012374f28429b0aa8ad469b9fe363466351545f

  • SHA256

    7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25

  • SHA512

    925dfdb9961030bea95c908d40c166b397bca410e0eba5c881fe810e3c3af604df332b556bba5ccc1c53e06b3c1d3b6a94fbde4d6b7c7d448ef78db9b9d29c69

  • SSDEEP

    24576:bCC4MROxnFE3mi9rbEI0AilFEvxH44ooM:bKMiup9rbEI0AilFEvxH4

Score
10/10

Malware Config

Extracted

Family

orcus

Botnet

TEST_LEO_FAKE

C2

0.0.0.0:1268

Mutex

4b7e745d24cf405ca3d04bd10e33b1c6

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Windows_Defender\Defender.exe

  • reconnect_delay

    10000

  • registry_keyname

    W_Defender

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\Defender.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7b0ed4f91e2801784eb139e0928eb9688e2ee2f35bd0eeb5ce8d9e7b83199b25
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections