General

  • Target

    vmax.rar

  • Size

    571KB

  • Sample

    250102-a4djsswkdk

  • MD5

    998b8430d6b3b5cf493460d1790f0256

  • SHA1

    84fab4b477ee6569e228dea3cabeba3a044aa8f5

  • SHA256

    d8a644f5aef669e0682ae0fbe2685e1453b2d0e7eda5e178d0b0547b747120ef

  • SHA512

    77e6b6855176b056d6102454e68d5c7007072f45989b8735091925bc09668ca80fa62b1f22b753b318d79712bad483c7cdb89c6d06960e50bd95a5b1adc88a8f

  • SSDEEP

    12288:ofz4DPJwJ9jOm4Xsj5DxiTeQvqYWyDVcKWyOzPqYC83MiOGA/Kaf:sMN+9jz6Sm5/hVcKfOTC83bOGA/Kaf

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

2da3ffc776c743d289a69d0dcbf09041

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Window\paint.exe

  • reconnect_delay

    10000

  • registry_keyname

    svhost

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\svhost.exe

Targets

    • Target

      vmax.exe

    • Size

      909KB

    • MD5

      09ba4336061b39c6de460e559a86144d

    • SHA1

      814db11290e5f753814f1525eb8c4d609aa6c1de

    • SHA256

      8054ececfb1c163cc15de00bae2b97b490e381875863864be9c0e4a8399a7ad6

    • SHA512

      e8c3a4334f18e1d07c95a4ce210a495e654fc20898dc27832f8b54ebeadb5be12f4ff0e758af7610964e9fcde787519683e0152c729fc4e95be7d28b20aaaedc

    • SSDEEP

      24576:PZw4MROxnFj3cxXFHXRrZlI0AilFEvxHirAf:PZTMi1ERhrZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks