General
-
Target
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
-
Size
913KB
-
Sample
241226-bdrt6stjgp
-
MD5
0f1c7991b1c30ed0626cf60660edc373
-
SHA1
e8b918d39ead158f83d95bcd676611d2a9a88aa2
-
SHA256
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
-
SHA512
275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c
-
SSDEEP
24576:KqSM4MROxnFl33zTrrcI0AilFEvxHPLWoo5:fAMirXrrcI0AilFEvxHPL
Behavioral task
behavioral1
Sample
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165.exe
Resource
win7-20241023-en
Malware Config
Extracted
orcus
System
199.195.253.181:25202
ecca0f439cec4158b200af951642a93a
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\Microsoft\speech\voices\COM Surrogate.exe
-
reconnect_delay
10000
-
registry_keyname
COM_key
-
taskscheduler_taskname
COM start
-
watchdog_path
AppData\COM Surrogate.exe
Targets
-
-
Target
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
-
Size
913KB
-
MD5
0f1c7991b1c30ed0626cf60660edc373
-
SHA1
e8b918d39ead158f83d95bcd676611d2a9a88aa2
-
SHA256
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
-
SHA512
275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c
-
SSDEEP
24576:KqSM4MROxnFl33zTrrcI0AilFEvxHPLWoo5:fAMirXrrcI0AilFEvxHPL
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-