General
-
Target
7b9f174ec0e6bcd199131ffaa876aa6c84a1233bb12d62c2851ab7e950fb39b8
-
Size
924KB
-
Sample
241219-bjkcaa1lgl
-
MD5
341714db087bd7bfe3d65cab7dccb3b7
-
SHA1
1c2f9668fe0d6e548570064ad1f5349239c88761
-
SHA256
7b9f174ec0e6bcd199131ffaa876aa6c84a1233bb12d62c2851ab7e950fb39b8
-
SHA512
05df013b6cbc310e61b36fd77475802c465f2fc0a64bcae744518de73b91e14a51506cec08e30f9aad12b02d9e81e56462fd54a656aad3306293b1a53da6bf09
-
SSDEEP
24576:bCC4MROxnFE3mi+rrcI0AilFEvxHP+ooM:bKMiup+rrcI0AilFEvxHP
Behavioral task
behavioral1
Sample
7b9f174ec0e6bcd199131ffaa876aa6c84a1233bb12d62c2851ab7e950fb39b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b9f174ec0e6bcd199131ffaa876aa6c84a1233bb12d62c2851ab7e950fb39b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
TEST_LEO_FAKE
0.0.0.0:1268
4b7e745d24cf405ca3d04bd10e33b1c6
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Windows_Defender\Defender.exe
-
reconnect_delay
10000
-
registry_keyname
W_Defender
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\Defender.exe
Targets
-
-
Target
7b9f174ec0e6bcd199131ffaa876aa6c84a1233bb12d62c2851ab7e950fb39b8
-
Size
924KB
-
MD5
341714db087bd7bfe3d65cab7dccb3b7
-
SHA1
1c2f9668fe0d6e548570064ad1f5349239c88761
-
SHA256
7b9f174ec0e6bcd199131ffaa876aa6c84a1233bb12d62c2851ab7e950fb39b8
-
SHA512
05df013b6cbc310e61b36fd77475802c465f2fc0a64bcae744518de73b91e14a51506cec08e30f9aad12b02d9e81e56462fd54a656aad3306293b1a53da6bf09
-
SSDEEP
24576:bCC4MROxnFE3mi+rrcI0AilFEvxHP+ooM:bKMiup+rrcI0AilFEvxHP
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-