General

  • Target

    7761133cb4ae903f269c35218b773acf119e0382ab1fd80958f6bb80515f8ee8

  • Size

    917KB

  • Sample

    241219-bn3z7azqfw

  • MD5

    cf0dd193b3411fab2cdc43e49bc6b850

  • SHA1

    1fc53efd2ee6eadcd145b35d1964fa80daed81ae

  • SHA256

    7761133cb4ae903f269c35218b773acf119e0382ab1fd80958f6bb80515f8ee8

  • SHA512

    dbb54b172b4de3dea5d681fb2f2b96e8a38b5e1d65385c3500f71c26d95c214c20fd2d710d98e7107427a887307cedd6958dbdf74f6ac4235e6c2968ab79af6d

  • SSDEEP

    12288:xMLaIPO6EJr/ThI7dG1lFlWcYT70pxnnaaoawhmy9kgWrUrZNrI0AilFEvxHvBMi:VDg4MROxnFe1/rZlI0AilFEvxHiOOYV

Malware Config

Extracted

Family

orcus

C2

Ezzka1337212312331-64524.portmap.host:64524

Mutex

b36ed3c7eee04d05bd5e94ae29f2d7fb

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\.minecraft\Launcher.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      7761133cb4ae903f269c35218b773acf119e0382ab1fd80958f6bb80515f8ee8

    • Size

      917KB

    • MD5

      cf0dd193b3411fab2cdc43e49bc6b850

    • SHA1

      1fc53efd2ee6eadcd145b35d1964fa80daed81ae

    • SHA256

      7761133cb4ae903f269c35218b773acf119e0382ab1fd80958f6bb80515f8ee8

    • SHA512

      dbb54b172b4de3dea5d681fb2f2b96e8a38b5e1d65385c3500f71c26d95c214c20fd2d710d98e7107427a887307cedd6958dbdf74f6ac4235e6c2968ab79af6d

    • SSDEEP

      12288:xMLaIPO6EJr/ThI7dG1lFlWcYT70pxnnaaoawhmy9kgWrUrZNrI0AilFEvxHvBMi:VDg4MROxnFe1/rZlI0AilFEvxHiOOYV

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks