General

  • Target

    79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970

  • Size

    11.4MB

  • Sample

    241224-bfpgtsxmgp

  • MD5

    ff89d18d0a8bf7a26b63518d6c522cb5

  • SHA1

    8ef17282972234b1761adebaff024edcdfaabbde

  • SHA256

    79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970

  • SHA512

    ff79cf2b7a01fd7dfd9a889e5faa09583f276c370bc603b1baa1eef5f47ea747f6acf02a04f6b00ff08dfd0f7f6178f72396170094a9753070f21db6c2f9a1dc

  • SSDEEP

    196608:qdk0W8/9E6DY8XMCHGLLc54i1wN+lPIcu9KYK39srRqZksfidSEo3PP/NMRRcHx3:sW81LXMCHWUjqcuIOeTd9/P/N9B

Malware Config

Extracted

Family

orcus

Botnet

vgbn

C2

192.168.0.104:10134

Mutex

2efe898857ff456fbb532c7b6f2f16cb

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Windows\xcvbhdf.exe

  • reconnect_delay

    10000

  • registry_keyname

    xcvbhdf.exe

  • taskscheduler_taskname

    xcvbhdf.exe

  • watchdog_path

    AppData\asdfasdfasdf.exe

Targets

    • Target

      79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970

    • Size

      11.4MB

    • MD5

      ff89d18d0a8bf7a26b63518d6c522cb5

    • SHA1

      8ef17282972234b1761adebaff024edcdfaabbde

    • SHA256

      79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970

    • SHA512

      ff79cf2b7a01fd7dfd9a889e5faa09583f276c370bc603b1baa1eef5f47ea747f6acf02a04f6b00ff08dfd0f7f6178f72396170094a9753070f21db6c2f9a1dc

    • SSDEEP

      196608:qdk0W8/9E6DY8XMCHGLLc54i1wN+lPIcu9KYK39srRqZksfidSEo3PP/NMRRcHx3:sW81LXMCHWUjqcuIOeTd9/P/N9B

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • UAC bypass

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks