General

  • Target

    744f346ee7c463c40748722beba297a4f79511e0bc9317c21ae5932ed9e9ea70

  • Size

    935KB

  • Sample

    241222-bl2z4sxmgn

  • MD5

    d9efa6ddca490cf2c4614ca04f5d5f2c

  • SHA1

    0fdb3199628bdd2489db70af59f172505545f0c0

  • SHA256

    744f346ee7c463c40748722beba297a4f79511e0bc9317c21ae5932ed9e9ea70

  • SHA512

    df9b52b79a87a705e2de322346672b705cee0d3864a26f267e76de9b468ccf30a06a053ef4531dd1998ecb7e1d7cc72f8d954a798fd93dd4f25c0182a79f8448

  • SSDEEP

    24576:ea64MROxnFj3mrkxrrcI0AilFEvxHPEoo1:eKMi1CqrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

d0f852f528b54b79a18cd745ef31998e

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Audio HD drive

  • taskscheduler_taskname

    Audio HD drive

  • watchdog_path

    Temp\OrcusWatchdog.exe

Targets

    • Target

      744f346ee7c463c40748722beba297a4f79511e0bc9317c21ae5932ed9e9ea70

    • Size

      935KB

    • MD5

      d9efa6ddca490cf2c4614ca04f5d5f2c

    • SHA1

      0fdb3199628bdd2489db70af59f172505545f0c0

    • SHA256

      744f346ee7c463c40748722beba297a4f79511e0bc9317c21ae5932ed9e9ea70

    • SHA512

      df9b52b79a87a705e2de322346672b705cee0d3864a26f267e76de9b468ccf30a06a053ef4531dd1998ecb7e1d7cc72f8d954a798fd93dd4f25c0182a79f8448

    • SSDEEP

      24576:ea64MROxnFj3mrkxrrcI0AilFEvxHPEoo1:eKMi1CqrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks