General
-
Target
64657c8e2891fee00ec8d8763b2ad4b1.webp
-
Size
1KB
-
Sample
250102-csjb1sxrgz
-
MD5
4cbe96bdb920f426f2adc24b954ff59a
-
SHA1
d0d196ea0a62464cf443e21983500b93aa8751de
-
SHA256
1a3ed0c77c2f2f3b1094eb76cd25fcd39aa0b8790ab099570ec7acb9b5ae1a22
-
SHA512
f1b7c73b4946cdda5318a2489dced7cd6f6a3598e1d93632349d56e516e9f4c35d57560aa6972f823f41720d02252f85ae702decbd3192e833ac5c27eb59acad
Static task
static1
Malware Config
Targets
-
-
Target
64657c8e2891fee00ec8d8763b2ad4b1.webp
-
Size
1KB
-
MD5
4cbe96bdb920f426f2adc24b954ff59a
-
SHA1
d0d196ea0a62464cf443e21983500b93aa8751de
-
SHA256
1a3ed0c77c2f2f3b1094eb76cd25fcd39aa0b8790ab099570ec7acb9b5ae1a22
-
SHA512
f1b7c73b4946cdda5318a2489dced7cd6f6a3598e1d93632349d56e516e9f4c35d57560aa6972f823f41720d02252f85ae702decbd3192e833ac5c27eb59acad
-
Orcus family
-
Orcurs Rat Executable
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-