General
-
Target
554ba820fd72b48db8cfd0c6f8c56e20675f993408df0504e2d80c2f68dbe631
-
Size
16.5MB
-
Sample
250114-bdm6zsvlak
-
MD5
ded6f7fee10797b02f8876dad0c84ae6
-
SHA1
ca2e5e3aa7463fc33444b7a4de5dfa33b3efc83d
-
SHA256
554ba820fd72b48db8cfd0c6f8c56e20675f993408df0504e2d80c2f68dbe631
-
SHA512
565fbd16d8b6ee43b61ea8f5e0d5284c9823119b6f7740aa182ecd18c032b2148e8a8ef88661fcd8a89d25e4e0bfaf9fdfc4104d6c76cbfaeab85984babbaca2
-
SSDEEP
393216:z0EjcTK84e3km6NsyYSzOshouIkPftRL54lRC9l1dy1JC:wE4CsAsyYSawouTtRL/y
Behavioral task
behavioral1
Sample
554ba820fd72b48db8cfd0c6f8c56e20675f993408df0504e2d80c2f68dbe631.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
554ba820fd72b48db8cfd0c6f8c56e20675f993408df0504e2d80c2f68dbe631.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
FunPay
31.44.184.52:44657
sudo_vm3jypee5e4wpgyaqsjreb4akskikm0b
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\privategamebase\Discord.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
554ba820fd72b48db8cfd0c6f8c56e20675f993408df0504e2d80c2f68dbe631
-
Size
16.5MB
-
MD5
ded6f7fee10797b02f8876dad0c84ae6
-
SHA1
ca2e5e3aa7463fc33444b7a4de5dfa33b3efc83d
-
SHA256
554ba820fd72b48db8cfd0c6f8c56e20675f993408df0504e2d80c2f68dbe631
-
SHA512
565fbd16d8b6ee43b61ea8f5e0d5284c9823119b6f7740aa182ecd18c032b2148e8a8ef88661fcd8a89d25e4e0bfaf9fdfc4104d6c76cbfaeab85984babbaca2
-
SSDEEP
393216:z0EjcTK84e3km6NsyYSzOshouIkPftRL54lRC9l1dy1JC:wE4CsAsyYSawouTtRL/y
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1