General
-
Target
890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361
-
Size
933KB
-
Sample
241224-bmmltaxnaz
-
MD5
46418e78f2b8d6b8ff8069610f499921
-
SHA1
529fbc61339cf988b2d98a25a30bc548019c0125
-
SHA256
890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361
-
SHA512
1b1d97a413b0f2de21d056aac047c2f279a5b3c7314513a4f983262fb03eede5f065aaa2d02943b964dd9c4306db5f84a50889a280c6c2da97a94359a224ef69
-
SSDEEP
24576:yRP4MROxnFKj3wyv/rrcI0AilFEvxHPUooS:yyMi4TwurrcI0AilFEvxHP
Behavioral task
behavioral1
Sample
890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
vgbn
192.168.0.104:10134
2efe898857ff456fbb532c7b6f2f16cb
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Windows\xcvbhdf.exe
-
reconnect_delay
10000
-
registry_keyname
xcvbhdf.exe
-
taskscheduler_taskname
xcvbhdf.exe
-
watchdog_path
AppData\asdfasdfasdf.exe
Targets
-
-
Target
890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361
-
Size
933KB
-
MD5
46418e78f2b8d6b8ff8069610f499921
-
SHA1
529fbc61339cf988b2d98a25a30bc548019c0125
-
SHA256
890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361
-
SHA512
1b1d97a413b0f2de21d056aac047c2f279a5b3c7314513a4f983262fb03eede5f065aaa2d02943b964dd9c4306db5f84a50889a280c6c2da97a94359a224ef69
-
SSDEEP
24576:yRP4MROxnFKj3wyv/rrcI0AilFEvxHPUooS:yyMi4TwurrcI0AilFEvxHP
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4