General
-
Target
vmax.rar
-
Size
571KB
-
Sample
250102-a4djsswkdk
-
MD5
998b8430d6b3b5cf493460d1790f0256
-
SHA1
84fab4b477ee6569e228dea3cabeba3a044aa8f5
-
SHA256
d8a644f5aef669e0682ae0fbe2685e1453b2d0e7eda5e178d0b0547b747120ef
-
SHA512
77e6b6855176b056d6102454e68d5c7007072f45989b8735091925bc09668ca80fa62b1f22b753b318d79712bad483c7cdb89c6d06960e50bd95a5b1adc88a8f
-
SSDEEP
12288:ofz4DPJwJ9jOm4Xsj5DxiTeQvqYWyDVcKWyOzPqYC83MiOGA/Kaf:sMN+9jz6Sm5/hVcKfOTC83bOGA/Kaf
Malware Config
Extracted
orcus
127.0.0.1:10134
2da3ffc776c743d289a69d0dcbf09041
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Window\paint.exe
-
reconnect_delay
10000
-
registry_keyname
svhost
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\svhost.exe
Targets
-
-
Target
vmax.exe
-
Size
909KB
-
MD5
09ba4336061b39c6de460e559a86144d
-
SHA1
814db11290e5f753814f1525eb8c4d609aa6c1de
-
SHA256
8054ececfb1c163cc15de00bae2b97b490e381875863864be9c0e4a8399a7ad6
-
SHA512
e8c3a4334f18e1d07c95a4ce210a495e654fc20898dc27832f8b54ebeadb5be12f4ff0e758af7610964e9fcde787519683e0152c729fc4e95be7d28b20aaaedc
-
SSDEEP
24576:PZw4MROxnFj3cxXFHXRrZlI0AilFEvxHirAf:PZTMi1ERhrZlI0AilFEvxHi
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-