General

  • Target

    5420d84bccd4b32b628fa06aba8d0ad2e8da6e3c8c79a1f7ecc248033c9e4e3d

  • Size

    924KB

  • Sample

    241224-bg1aqaxlfx

  • MD5

    62d70f8671fd2008fc9f0e17d57d809c

  • SHA1

    8b743631a6ea12f7c00a3b586ebdc4e81d0cd892

  • SHA256

    5420d84bccd4b32b628fa06aba8d0ad2e8da6e3c8c79a1f7ecc248033c9e4e3d

  • SHA512

    58bf0a6e47079c3d38380966ac5216249e6eadff1c4d867cf72af1becde10de3ce5e75a4b0b59e832ab4983b65f1af1cd8c855620b744c33aee3c55debee14f4

  • SSDEEP

    24576:ZGbU4MROxnFE3idc1RlrZlI0AilFEvxHiaj:ZGbHMiudblrZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

Botnet

testbuild1

C2

127.0.0.1:1268

Mutex

979c2ee9d7ff48d0a2e4e2df3c2c864d

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Common Files\System\HD Audio\HDAudio.exe

  • reconnect_delay

    10000

  • registry_keyname

    HDAudioDriver

  • taskscheduler_taskname

    HDAudioDriver

  • watchdog_path

    AppData\HDAudioWatchdog.exe

Targets

    • Target

      5420d84bccd4b32b628fa06aba8d0ad2e8da6e3c8c79a1f7ecc248033c9e4e3d

    • Size

      924KB

    • MD5

      62d70f8671fd2008fc9f0e17d57d809c

    • SHA1

      8b743631a6ea12f7c00a3b586ebdc4e81d0cd892

    • SHA256

      5420d84bccd4b32b628fa06aba8d0ad2e8da6e3c8c79a1f7ecc248033c9e4e3d

    • SHA512

      58bf0a6e47079c3d38380966ac5216249e6eadff1c4d867cf72af1becde10de3ce5e75a4b0b59e832ab4983b65f1af1cd8c855620b744c33aee3c55debee14f4

    • SSDEEP

      24576:ZGbU4MROxnFE3idc1RlrZlI0AilFEvxHiaj:ZGbHMiudblrZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks