General
-
Target
79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970
-
Size
11.4MB
-
Sample
241224-bfpgtsxmgp
-
MD5
ff89d18d0a8bf7a26b63518d6c522cb5
-
SHA1
8ef17282972234b1761adebaff024edcdfaabbde
-
SHA256
79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970
-
SHA512
ff79cf2b7a01fd7dfd9a889e5faa09583f276c370bc603b1baa1eef5f47ea747f6acf02a04f6b00ff08dfd0f7f6178f72396170094a9753070f21db6c2f9a1dc
-
SSDEEP
196608:qdk0W8/9E6DY8XMCHGLLc54i1wN+lPIcu9KYK39srRqZksfidSEo3PP/NMRRcHx3:sW81LXMCHWUjqcuIOeTd9/P/N9B
Behavioral task
behavioral1
Sample
79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
vgbn
192.168.0.104:10134
2efe898857ff456fbb532c7b6f2f16cb
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Windows\xcvbhdf.exe
-
reconnect_delay
10000
-
registry_keyname
xcvbhdf.exe
-
taskscheduler_taskname
xcvbhdf.exe
-
watchdog_path
AppData\asdfasdfasdf.exe
Targets
-
-
Target
79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970
-
Size
11.4MB
-
MD5
ff89d18d0a8bf7a26b63518d6c522cb5
-
SHA1
8ef17282972234b1761adebaff024edcdfaabbde
-
SHA256
79c7e85a85d1e1ac4f606dfc86ad5a42ad4efed87025497bb4c8f6c633e4c970
-
SHA512
ff79cf2b7a01fd7dfd9a889e5faa09583f276c370bc603b1baa1eef5f47ea747f6acf02a04f6b00ff08dfd0f7f6178f72396170094a9753070f21db6c2f9a1dc
-
SSDEEP
196608:qdk0W8/9E6DY8XMCHGLLc54i1wN+lPIcu9KYK39srRqZksfidSEo3PP/NMRRcHx3:sW81LXMCHWUjqcuIOeTd9/P/N9B
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4