General

  • Target

    987a7d82d2390944d7c8fd67e7de1dcce7fd6be9580ce8f9226532a73b4d20e7

  • Size

    924KB

  • Sample

    241220-bmtecsvqcx

  • MD5

    7e282c2bbb80780191282e11331f85fa

  • SHA1

    0b14fc0f14f86957b8e1b2f379c389b780dda53c

  • SHA256

    987a7d82d2390944d7c8fd67e7de1dcce7fd6be9580ce8f9226532a73b4d20e7

  • SHA512

    9c29e51f13c34a6f94ecc0c4500c4143901ffba4f5cecea978effa0b5dce5cb19b4b582cce3cd3656ba270f2d750fc751780b16c9a18b8fe3fdf036bfb0c4cd3

  • SSDEEP

    24576:xnQm4MROxnFE3C4rrcI0AilFEvxHjZMQp:xnQlMiuC4rrcI0AilFEvxHj

Malware Config

Extracted

Family

orcus

Botnet

BUILD1

C2

46.8.210.6:10134

Mutex

979c2ee9d7ff48d0a2e4e2df3c2c864d

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Common Files\System\HD Audio\HDAudio.exe

  • reconnect_delay

    10000

  • registry_keyname

    HDAudioDriver

  • taskscheduler_taskname

    HDAudioDriver

  • watchdog_path

    AppData\HDAudioWatchdog.exe

Targets

    • Target

      987a7d82d2390944d7c8fd67e7de1dcce7fd6be9580ce8f9226532a73b4d20e7

    • Size

      924KB

    • MD5

      7e282c2bbb80780191282e11331f85fa

    • SHA1

      0b14fc0f14f86957b8e1b2f379c389b780dda53c

    • SHA256

      987a7d82d2390944d7c8fd67e7de1dcce7fd6be9580ce8f9226532a73b4d20e7

    • SHA512

      9c29e51f13c34a6f94ecc0c4500c4143901ffba4f5cecea978effa0b5dce5cb19b4b582cce3cd3656ba270f2d750fc751780b16c9a18b8fe3fdf036bfb0c4cd3

    • SSDEEP

      24576:xnQm4MROxnFE3C4rrcI0AilFEvxHjZMQp:xnQlMiuC4rrcI0AilFEvxHj

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks