General
-
Target
4885af6cc7c40dde696af2e8f734bd5fa746ed0e765bcabdd2fc153815dfd3d9
-
Size
839KB
-
Sample
250104-bheemsvqgk
-
MD5
72800a4397df679c280dfbdc0808fbc3
-
SHA1
0f0a0e62548fecfbecfa3b96bbb4df9d3949405c
-
SHA256
4885af6cc7c40dde696af2e8f734bd5fa746ed0e765bcabdd2fc153815dfd3d9
-
SHA512
26e8ef819bda84942033cc6446a6edf668d1fd04267467fbc65d40230905ec87666e23ee7b597c46c56edfa08c31a9f77614ebb922994677793ad1f4cb26f9ed
-
SSDEEP
24576:upS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rq:uL4auS+UjfU2TmdIbt+r
Behavioral task
behavioral1
Sample
4885af6cc7c40dde696af2e8f734bd5fa746ed0e765bcabdd2fc153815dfd3d9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4885af6cc7c40dde696af2e8f734bd5fa746ed0e765bcabdd2fc153815dfd3d9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
2.tcp.eu.ngrok.io
64a224328d4a4eabbb2b12669d491dd2
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/03/2025 18:16:40
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
4885af6cc7c40dde696af2e8f734bd5fa746ed0e765bcabdd2fc153815dfd3d9
-
Size
839KB
-
MD5
72800a4397df679c280dfbdc0808fbc3
-
SHA1
0f0a0e62548fecfbecfa3b96bbb4df9d3949405c
-
SHA256
4885af6cc7c40dde696af2e8f734bd5fa746ed0e765bcabdd2fc153815dfd3d9
-
SHA512
26e8ef819bda84942033cc6446a6edf668d1fd04267467fbc65d40230905ec87666e23ee7b597c46c56edfa08c31a9f77614ebb922994677793ad1f4cb26f9ed
-
SSDEEP
24576:upS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rq:uL4auS+UjfU2TmdIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-