Behavioral task
behavioral1
Sample
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165.exe
Resource
win7-20241023-en
General
-
Target
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
-
Size
913KB
-
MD5
0f1c7991b1c30ed0626cf60660edc373
-
SHA1
e8b918d39ead158f83d95bcd676611d2a9a88aa2
-
SHA256
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
-
SHA512
275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c
-
SSDEEP
24576:KqSM4MROxnFl33zTrrcI0AilFEvxHPLWoo5:fAMirXrrcI0AilFEvxHPL
Malware Config
Extracted
orcus
System
199.195.253.181:25202
ecca0f439cec4158b200af951642a93a
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\Microsoft\speech\voices\COM Surrogate.exe
-
reconnect_delay
10000
-
registry_keyname
COM_key
-
taskscheduler_taskname
COM start
-
watchdog_path
AppData\COM Surrogate.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
Files
-
927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 908KB - Virtual size: 907KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ