General

  • Target

    063308af686c01cad617276c798ad7c6edba1ede5df30079bbb08771cf00955d

  • Size

    1.2MB

  • Sample

    250108-bgt4psxkhy

  • MD5

    602f77c859a30411d022bac96a7f5842

  • SHA1

    541344e8d7b1c3cea99bb3a76eea9c76aab392b5

  • SHA256

    063308af686c01cad617276c798ad7c6edba1ede5df30079bbb08771cf00955d

  • SHA512

    af7d87d30517de401c176b2630f26e80e5b5a04fd7cad66f0cb997a0293ba192f3f4c33cc2d240cec9950c32851b7a8782837552b71d96f9aebef07a40a943db

  • SSDEEP

    24576:O+S04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfKi7Ibt+rH:Oa4auS+UjfU2T/5XD/Ibt+r

Malware Config

Extracted

Family

orcus

Botnet

RD

C2

192.168.0.221

Mutex

c00c8c3b1e504c1588a309b3cda50b6b

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    01/05/2025 15:42:16

  • plugins

    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

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_name

    Audio HD Driver

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Targets

    • Target

      063308af686c01cad617276c798ad7c6edba1ede5df30079bbb08771cf00955d

    • Size

      1.2MB

    • MD5

      602f77c859a30411d022bac96a7f5842

    • SHA1

      541344e8d7b1c3cea99bb3a76eea9c76aab392b5

    • SHA256

      063308af686c01cad617276c798ad7c6edba1ede5df30079bbb08771cf00955d

    • SHA512

      af7d87d30517de401c176b2630f26e80e5b5a04fd7cad66f0cb997a0293ba192f3f4c33cc2d240cec9950c32851b7a8782837552b71d96f9aebef07a40a943db

    • SSDEEP

      24576:O+S04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfKi7Ibt+rH:Oa4auS+UjfU2T/5XD/Ibt+r

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks