General

  • Target

    3def5685bcba5bde6993fc2a6dac2082ebdf0a608ed158bffcc0530692c9fb83

  • Size

    842KB

  • Sample

    241225-bedzpssqbk

  • MD5

    eee49c00db8227d3bba2e0a7bfede60e

  • SHA1

    a2cbdff93ffad0e944c4d7d807d72a97a681431c

  • SHA256

    3def5685bcba5bde6993fc2a6dac2082ebdf0a608ed158bffcc0530692c9fb83

  • SHA512

    3c8ae70b78f21a054c167f184288db9fc42876ad434465d4f1ef8aa6571215f41f1c6e6aeb2b118f0d1ba833092b51f2f78079dc24cb8cd987df928254636098

  • SSDEEP

    24576:rY/S04YNEMuExDiU6E5R9s8xY/2l/dFLbB83oIbt+rT:rY14auS+UjfU2TVb63oIbt+r

Malware Config

Extracted

Family

orcus

C2

127.0.0.1

Mutex

b9b1f00b4fb14d0298e9777e900b7f5d

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    12/22/2024 16:34:42

  • plugins

    AgUFyfihswTdIPqEArukcmEdSF06Hw9CAFMAbwBEACAAUAByAG8AdABlAGMAdABpAG8AbgAHAzEALgAwAEEgMQA2ADkAMAAyADgAYQAzADkAYQBjAGMANABiADkAZAA5ADUAZAA3ADgAYQA3AGUAZgA0ADcAZAA1ADgAMgBkAAEAAAACAg==

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Targets

    • Target

      3def5685bcba5bde6993fc2a6dac2082ebdf0a608ed158bffcc0530692c9fb83

    • Size

      842KB

    • MD5

      eee49c00db8227d3bba2e0a7bfede60e

    • SHA1

      a2cbdff93ffad0e944c4d7d807d72a97a681431c

    • SHA256

      3def5685bcba5bde6993fc2a6dac2082ebdf0a608ed158bffcc0530692c9fb83

    • SHA512

      3c8ae70b78f21a054c167f184288db9fc42876ad434465d4f1ef8aa6571215f41f1c6e6aeb2b118f0d1ba833092b51f2f78079dc24cb8cd987df928254636098

    • SSDEEP

      24576:rY/S04YNEMuExDiU6E5R9s8xY/2l/dFLbB83oIbt+rT:rY14auS+UjfU2TVb63oIbt+r

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks