General

  • Target

    927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165

  • Size

    913KB

  • Sample

    241226-bdrt6stjgp

  • MD5

    0f1c7991b1c30ed0626cf60660edc373

  • SHA1

    e8b918d39ead158f83d95bcd676611d2a9a88aa2

  • SHA256

    927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165

  • SHA512

    275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c

  • SSDEEP

    24576:KqSM4MROxnFl33zTrrcI0AilFEvxHPLWoo5:fAMirXrrcI0AilFEvxHPL

Malware Config

Extracted

Family

orcus

Botnet

System

C2

199.195.253.181:25202

Mutex

ecca0f439cec4158b200af951642a93a

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %appdata%\Microsoft\speech\voices\COM Surrogate.exe

  • reconnect_delay

    10000

  • registry_keyname

    COM_key

  • taskscheduler_taskname

    COM start

  • watchdog_path

    AppData\COM Surrogate.exe

Targets

    • Target

      927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165

    • Size

      913KB

    • MD5

      0f1c7991b1c30ed0626cf60660edc373

    • SHA1

      e8b918d39ead158f83d95bcd676611d2a9a88aa2

    • SHA256

      927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165

    • SHA512

      275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c

    • SSDEEP

      24576:KqSM4MROxnFl33zTrrcI0AilFEvxHPLWoo5:fAMirXrrcI0AilFEvxHPL

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks