General

  • Target

    65d04445aa6c76882d4dff12bb2c85c58fb6214410a9a537774ab224d18e73e8

  • Size

    1.2MB

  • Sample

    241223-bkhvvatlaq

  • MD5

    288bf0fdd34f56af2476c62d8c5ca087

  • SHA1

    8c6e09af2430528f11fc1f09a1c9fd621bcf7ee9

  • SHA256

    65d04445aa6c76882d4dff12bb2c85c58fb6214410a9a537774ab224d18e73e8

  • SHA512

    e3a239f9bb6d8996e9cf36a7c2750ce5e10986b12efea2d2f3467e88996b7e4a92d0876d28e7b8b28af62b2b3e2bd79537efc61fc49f8f069379d45e980f68c6

  • SSDEEP

    24576:gygD3S04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfG2xIbt+rP:gygDt4auS+UjfU2T/5XD5xIbt+r

Malware Config

Extracted

Family

orcus

C2

192.168.0.40

94.4.114.86

Mutex

6e9ecfb4c15b453a88480ef99e4a85be

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %AppData%\Microsoft\Windows\Start Menu\Programs\Startup\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    12/02/2024 18:09:31

  • plugins

    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

  • reconnect_delay

    10000

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Targets

    • Target

      65d04445aa6c76882d4dff12bb2c85c58fb6214410a9a537774ab224d18e73e8

    • Size

      1.2MB

    • MD5

      288bf0fdd34f56af2476c62d8c5ca087

    • SHA1

      8c6e09af2430528f11fc1f09a1c9fd621bcf7ee9

    • SHA256

      65d04445aa6c76882d4dff12bb2c85c58fb6214410a9a537774ab224d18e73e8

    • SHA512

      e3a239f9bb6d8996e9cf36a7c2750ce5e10986b12efea2d2f3467e88996b7e4a92d0876d28e7b8b28af62b2b3e2bd79537efc61fc49f8f069379d45e980f68c6

    • SSDEEP

      24576:gygD3S04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfG2xIbt+rP:gygDt4auS+UjfU2T/5XD5xIbt+r

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks