General
-
Target
JaffaCakes118_eacf04d721fe4880dc73790ccbd58acf310dc0c90b13b7424200a9aa2b94640a
-
Size
926.0MB
-
Sample
241223-yxtjfazlft
-
MD5
930b3bbbaa989db448d8ec5c696a5a16
-
SHA1
a27e7c76990a31f1414d429e828c81e14f48a00a
-
SHA256
eacf04d721fe4880dc73790ccbd58acf310dc0c90b13b7424200a9aa2b94640a
-
SHA512
cb9dc7db9f4a4c0dc5407d0a9bbd5c1301d5c4d03fed7d6b972c61a816c8860aff072f1515189d21b3336448a7c19d99f636cc3b060e4628c2ef7dbd1e75291a
-
SSDEEP
49152:KUAHP06/eyShf+okdWtRAOk3HQ7JTDCgV4L6uzxGiWaUKU:WmBf2dWtnGcDnMjFWxK
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eacf04d721fe4880dc73790ccbd58acf310dc0c90b13b7424200a9aa2b94640a.exe
Resource
win7-20240729-en
Malware Config
Extracted
orcus
209.25.141.181:40489
248d60d8a7114264bce951ca45664b1d
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programdata%\Chrome\chromedriver.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
winlogon.exe
-
watchdog_path
AppData\svchost.exe
Targets
-
-
Target
JaffaCakes118_eacf04d721fe4880dc73790ccbd58acf310dc0c90b13b7424200a9aa2b94640a
-
Size
926.0MB
-
MD5
930b3bbbaa989db448d8ec5c696a5a16
-
SHA1
a27e7c76990a31f1414d429e828c81e14f48a00a
-
SHA256
eacf04d721fe4880dc73790ccbd58acf310dc0c90b13b7424200a9aa2b94640a
-
SHA512
cb9dc7db9f4a4c0dc5407d0a9bbd5c1301d5c4d03fed7d6b972c61a816c8860aff072f1515189d21b3336448a7c19d99f636cc3b060e4628c2ef7dbd1e75291a
-
SSDEEP
49152:KUAHP06/eyShf+okdWtRAOk3HQ7JTDCgV4L6uzxGiWaUKU:WmBf2dWtnGcDnMjFWxK
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-