General

  • Target

    815948363eaaf293964c190ac3665d0865503781110b211f6f39f64d49574607

  • Size

    918KB

  • Sample

    250108-bfzykayqgp

  • MD5

    32d54c2fa9f4f6534e5fe9d790977a15

  • SHA1

    63d1dfb167024dea8a7bd5a5d72b2eb962bede4b

  • SHA256

    815948363eaaf293964c190ac3665d0865503781110b211f6f39f64d49574607

  • SHA512

    28ae36ad42cadf490101572f1dd3a88b72593e25869784cefff7ad0bf75e2a3cf7b6399bc34949d95b279dfd3050c68679fa0e970caa87883219336c0b86d21b

  • SSDEEP

    24576:PGOd4MROxnFi3uUr2rZlI0AilFEvxHiJv:PGdMioVarZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

25.ip.gl.ply.gg:1909

Mutex

039f583b53844dc68ee502bf8377e03c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      815948363eaaf293964c190ac3665d0865503781110b211f6f39f64d49574607

    • Size

      918KB

    • MD5

      32d54c2fa9f4f6534e5fe9d790977a15

    • SHA1

      63d1dfb167024dea8a7bd5a5d72b2eb962bede4b

    • SHA256

      815948363eaaf293964c190ac3665d0865503781110b211f6f39f64d49574607

    • SHA512

      28ae36ad42cadf490101572f1dd3a88b72593e25869784cefff7ad0bf75e2a3cf7b6399bc34949d95b279dfd3050c68679fa0e970caa87883219336c0b86d21b

    • SSDEEP

      24576:PGOd4MROxnFi3uUr2rZlI0AilFEvxHiJv:PGdMioVarZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks