General

  • Target

    927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165

  • Size

    913KB

  • MD5

    0f1c7991b1c30ed0626cf60660edc373

  • SHA1

    e8b918d39ead158f83d95bcd676611d2a9a88aa2

  • SHA256

    927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165

  • SHA512

    275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c

  • SSDEEP

    24576:KqSM4MROxnFl33zTrrcI0AilFEvxHPLWoo5:fAMirXrrcI0AilFEvxHPL

Score
10/10

Malware Config

Extracted

Family

orcus

Botnet

System

C2

199.195.253.181:25202

Mutex

ecca0f439cec4158b200af951642a93a

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %appdata%\Microsoft\speech\voices\COM Surrogate.exe

  • reconnect_delay

    10000

  • registry_keyname

    COM_key

  • taskscheduler_taskname

    COM start

  • watchdog_path

    AppData\COM Surrogate.exe

Signatures

  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections