General

  • Target

    890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361

  • Size

    933KB

  • Sample

    241224-bmmltaxnaz

  • MD5

    46418e78f2b8d6b8ff8069610f499921

  • SHA1

    529fbc61339cf988b2d98a25a30bc548019c0125

  • SHA256

    890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361

  • SHA512

    1b1d97a413b0f2de21d056aac047c2f279a5b3c7314513a4f983262fb03eede5f065aaa2d02943b964dd9c4306db5f84a50889a280c6c2da97a94359a224ef69

  • SSDEEP

    24576:yRP4MROxnFKj3wyv/rrcI0AilFEvxHPUooS:yyMi4TwurrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

Botnet

vgbn

C2

192.168.0.104:10134

Mutex

2efe898857ff456fbb532c7b6f2f16cb

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Windows\xcvbhdf.exe

  • reconnect_delay

    10000

  • registry_keyname

    xcvbhdf.exe

  • taskscheduler_taskname

    xcvbhdf.exe

  • watchdog_path

    AppData\asdfasdfasdf.exe

Targets

    • Target

      890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361

    • Size

      933KB

    • MD5

      46418e78f2b8d6b8ff8069610f499921

    • SHA1

      529fbc61339cf988b2d98a25a30bc548019c0125

    • SHA256

      890a02f4e0c8bc09cfad53b688ad04016d8c78e94514e69684323598aabd6361

    • SHA512

      1b1d97a413b0f2de21d056aac047c2f279a5b3c7314513a4f983262fb03eede5f065aaa2d02943b964dd9c4306db5f84a50889a280c6c2da97a94359a224ef69

    • SSDEEP

      24576:yRP4MROxnFKj3wyv/rrcI0AilFEvxHPUooS:yyMi4TwurrcI0AilFEvxHP

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • UAC bypass

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks