General
-
Target
ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390
-
Size
3.0MB
-
Sample
250105-b494faxjgv
-
MD5
af31d01a7d0c9277553f874e6f8764ac
-
SHA1
22c88cdc20b1fc0363bc3dadff7642e3588a2ea5
-
SHA256
ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390
-
SHA512
68dc33145c2ac61688a8ec1376cc273d0994d381267dd6943b390539271b5aed0de5c709ad306a39aabdfa2bad274041c95871d28f02aa49f028ebb5151d18c2
-
SSDEEP
49152:RGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:RLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390.exe
Resource
win7-20241010-en
Malware Config
Extracted
orcus
steam
31.44.184.52:22587
sudo_3hywl5z2zo7blkw14tszonq0n5jzd6sh
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\tempeternaldle\asyncgenerator.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390
-
Size
3.0MB
-
MD5
af31d01a7d0c9277553f874e6f8764ac
-
SHA1
22c88cdc20b1fc0363bc3dadff7642e3588a2ea5
-
SHA256
ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390
-
SHA512
68dc33145c2ac61688a8ec1376cc273d0994d381267dd6943b390539271b5aed0de5c709ad306a39aabdfa2bad274041c95871d28f02aa49f028ebb5151d18c2
-
SSDEEP
49152:RGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:RLHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-