General
-
Target
idk.exe
-
Size
845KB
-
Sample
250112-rakjpavmez
-
MD5
c0f4b33fab9864dfebccb1f7621ac76a
-
SHA1
9e65684a22bae25570f019366657a83522434590
-
SHA256
ce59e3370985a4b7f243de0fb67848bcb223781077dee528e2f4adb8e9d8d656
-
SHA512
6cd5672e2b3615ebb94fb96de29fe1b2cbfa81c1e18080ad6fbb48b25457481e17d8919823970e5bd1e230e2e8c76d379a515551e35bdc10f305d3349ab3cefe
-
SSDEEP
24576:JvS04YNEMuExDiU6E5R9s8xY/2l/dHmIbt+rD:JF4auS+UjfU2THmIbt+r
Behavioral task
behavioral1
Sample
idk.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
idk.exe
Resource
win11-20241007-en
Malware Config
Extracted
orcus
6.tcp.eu.ngrok.io
ff1f02c9f26f4253869c1d0a04907775
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/12/2025 14:58:32
-
plugins
AgUFyfihswTdIPqEArukcmEdSF06Hw9CAFMAbwBEACAAUAByAG8AdABlAGMAdABpAG8AbgAHAzEALgAwAEEgMwBhADkAYwAwADkAOQA3AGEANgBlADQANAA2AGMAMQBiADYANgA4ADkAMgA1ADgAMQBjADMAYgAxADMAOABlAAEFl6aNkQPXkQKOmwKLvFcpr24sKCsVRABpAHMAYQBiAGwAZQAgAFcAZQBiAGMAYQBtACAATABpAGcAaAB0AHMABwMxAC4AMABBIGIAOABiAGQANQAxADUAOAA0ADkAZABjADQAMwAzADIAOQAxAGUAMQBiADEANQBmADYANQBiAGMAMwA3ADAAZAABAAAEBA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
idk.exe
-
Size
845KB
-
MD5
c0f4b33fab9864dfebccb1f7621ac76a
-
SHA1
9e65684a22bae25570f019366657a83522434590
-
SHA256
ce59e3370985a4b7f243de0fb67848bcb223781077dee528e2f4adb8e9d8d656
-
SHA512
6cd5672e2b3615ebb94fb96de29fe1b2cbfa81c1e18080ad6fbb48b25457481e17d8919823970e5bd1e230e2e8c76d379a515551e35bdc10f305d3349ab3cefe
-
SSDEEP
24576:JvS04YNEMuExDiU6E5R9s8xY/2l/dHmIbt+rD:JF4auS+UjfU2THmIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-