General
-
Target
cf4b3d1c620a6baee3a7d64a315a647511fd0ccdecc96aad29dc886f533f7812
-
Size
3.0MB
-
Sample
241226-bfj74stkcr
-
MD5
be850037192bd7845103dbcfcd52ecd5
-
SHA1
b009a8240c60864acecaef94699eb7cd4f79add6
-
SHA256
cf4b3d1c620a6baee3a7d64a315a647511fd0ccdecc96aad29dc886f533f7812
-
SHA512
35b8c96d14fc583886898caa115e08b7d9984d4c6feea048c8a202f3961eb5b01950bc2aeb8622703ca23c0e1bdd4c975ade3d68b9f27684d6ad2086c5c546c2
-
SSDEEP
49152:Cs7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:CsHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
cf4b3d1c620a6baee3a7d64a315a647511fd0ccdecc96aad29dc886f533f7812.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:16238
sudo_qoljrsynd5fcg31tysz2ibd994ah5uzp
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\wordpressgame\system.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
cf4b3d1c620a6baee3a7d64a315a647511fd0ccdecc96aad29dc886f533f7812
-
Size
3.0MB
-
MD5
be850037192bd7845103dbcfcd52ecd5
-
SHA1
b009a8240c60864acecaef94699eb7cd4f79add6
-
SHA256
cf4b3d1c620a6baee3a7d64a315a647511fd0ccdecc96aad29dc886f533f7812
-
SHA512
35b8c96d14fc583886898caa115e08b7d9984d4c6feea048c8a202f3961eb5b01950bc2aeb8622703ca23c0e1bdd4c975ade3d68b9f27684d6ad2086c5c546c2
-
SSDEEP
49152:Cs7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:CsHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-