General
-
Target
aba9252ba2ba2c67f8ab7b47869ee9def16815aaff37eebd4bd4000b552e7a66
-
Size
3.0MB
-
Sample
250104-blrjdawjbn
-
MD5
29588516a500d21012c697316ca29c4c
-
SHA1
31d6a026f8625c8dc282b2e9b432b9ba73bcea3a
-
SHA256
aba9252ba2ba2c67f8ab7b47869ee9def16815aaff37eebd4bd4000b552e7a66
-
SHA512
df023d2f9ff4f49c818b4f5f7587a554db266227f18a0f7ff006f1da335b3d71409337e0f6f00dd7c226373ee087b2c8d052011b7da213ae1c5d845747407cb0
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
aba9252ba2ba2c67f8ab7b47869ee9def16815aaff37eebd4bd4000b552e7a66.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
steam
31.44.184.52:22587
sudo_bvl4rmpxcoct1yqedarorv61sjgid7kz
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\securepolllow\eternaldle.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
aba9252ba2ba2c67f8ab7b47869ee9def16815aaff37eebd4bd4000b552e7a66
-
Size
3.0MB
-
MD5
29588516a500d21012c697316ca29c4c
-
SHA1
31d6a026f8625c8dc282b2e9b432b9ba73bcea3a
-
SHA256
aba9252ba2ba2c67f8ab7b47869ee9def16815aaff37eebd4bd4000b552e7a66
-
SHA512
df023d2f9ff4f49c818b4f5f7587a554db266227f18a0f7ff006f1da335b3d71409337e0f6f00dd7c226373ee087b2c8d052011b7da213ae1c5d845747407cb0
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-