General

  • Target

    ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390

  • Size

    3.0MB

  • Sample

    250105-b8rgwsyrgr

  • MD5

    af31d01a7d0c9277553f874e6f8764ac

  • SHA1

    22c88cdc20b1fc0363bc3dadff7642e3588a2ea5

  • SHA256

    ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390

  • SHA512

    68dc33145c2ac61688a8ec1376cc273d0994d381267dd6943b390539271b5aed0de5c709ad306a39aabdfa2bad274041c95871d28f02aa49f028ebb5151d18c2

  • SSDEEP

    49152:RGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:RLHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

steam

C2

31.44.184.52:22587

Mutex

sudo_3hywl5z2zo7blkw14tszonq0n5jzd6sh

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\tempeternaldle\asyncgenerator.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390

    • Size

      3.0MB

    • MD5

      af31d01a7d0c9277553f874e6f8764ac

    • SHA1

      22c88cdc20b1fc0363bc3dadff7642e3588a2ea5

    • SHA256

      ba2d767f8a512a7be3ca0117c2aecd5b89fcba89e42e7b9f8ccac8c6fead0390

    • SHA512

      68dc33145c2ac61688a8ec1376cc273d0994d381267dd6943b390539271b5aed0de5c709ad306a39aabdfa2bad274041c95871d28f02aa49f028ebb5151d18c2

    • SSDEEP

      49152:RGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:RLHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks