General
-
Target
a8774951e5a4f42f51c648a6303a8506ee6a4f9cead732c1ea19c8dbc7eb81f3
-
Size
924KB
-
Sample
250108-bf5ttayqhk
-
MD5
2666c3e10ddf6dd5136f8f7a98208bad
-
SHA1
607409553a00cd1586897f2417a6f64d3511e4a5
-
SHA256
a8774951e5a4f42f51c648a6303a8506ee6a4f9cead732c1ea19c8dbc7eb81f3
-
SHA512
77db9644579507110035f1bc73708d0048412e42c068414f686b1e35108b703931eae53af7c628f68b1a6977ded5f6c7ff5bb1ce8a7a1f26615572486639e53f
-
SSDEEP
24576:tHt4MROxnFE3a0rrcI0AilFEvxHjGvYBQo:tH6Miua0rrcI0AilFEvxHj
Behavioral task
behavioral1
Sample
a8774951e5a4f42f51c648a6303a8506ee6a4f9cead732c1ea19c8dbc7eb81f3.exe
Resource
win7-20240708-en
Malware Config
Extracted
orcus
hp-kissing.gl.joinmc.link:25565
b72b0f402ff141278242ee74106b34b8
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\WindowsFiels\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
IntelAutoStart
-
taskscheduler_taskname
DiscordUpdater
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
a8774951e5a4f42f51c648a6303a8506ee6a4f9cead732c1ea19c8dbc7eb81f3
-
Size
924KB
-
MD5
2666c3e10ddf6dd5136f8f7a98208bad
-
SHA1
607409553a00cd1586897f2417a6f64d3511e4a5
-
SHA256
a8774951e5a4f42f51c648a6303a8506ee6a4f9cead732c1ea19c8dbc7eb81f3
-
SHA512
77db9644579507110035f1bc73708d0048412e42c068414f686b1e35108b703931eae53af7c628f68b1a6977ded5f6c7ff5bb1ce8a7a1f26615572486639e53f
-
SSDEEP
24576:tHt4MROxnFE3a0rrcI0AilFEvxHjGvYBQo:tH6Miua0rrcI0AilFEvxHj
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-