General
-
Target
idk.exe
-
Size
845KB
-
Sample
250114-lew6dstqht
-
MD5
4430b4864bdb0536bb555c64f90a6fdf
-
SHA1
9692cd79639a1f228a389472b65ab04f3c016536
-
SHA256
bbc6bbbf62040d31c403ebb6cc1fde194f4676c3f7dde52af531d88aefc0238b
-
SHA512
b030596c8e6d605088f8bc503f0fe012cdf2398109459766dfbaf647070fe1cac3940292bd0089e334da309989129df0f6577fcfdbda58e0d15a10a8d43a436b
-
SSDEEP
24576:tvS04YNEMuExDiU6E5R9s8xY/2l/dHMIbt+rm:tF4auS+UjfU2THMIbt+r
Behavioral task
behavioral1
Sample
idk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
idk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
6.tcp.eu.ngrok.io
e0891e9c4f9f4554bd4e9011ead35949
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/14/2025 10:14:36
-
plugins
AgUFyfihswTdIPqEArukcmEdSF06Hw9CAFMAbwBEACAAUAByAG8AdABlAGMAdABpAG8AbgAHAzEALgAwAEEgMgA0AGIAOQAxAGIAYwBjADcAZgA0AGUANAA0ADgANgBiADEAZgA2ADYAMgAxAGIAYwBjADYAYQAyAGYAOAA2AAEFl6aNkQPXkQKOmwKLvFcpr24sKCsVRABpAHMAYQBiAGwAZQAgAFcAZQBiAGMAYQBtACAATABpAGcAaAB0AHMABwMxAC4AMABBIDkAMAA3AGEAYQBiADAAMAAxAGQAYQBhADQAYgA5AGIAOQBmAGQAYwAwAGUAMgAxAGYAYQAwADMAOQBlAGQAOQABAAAEBA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
idk.exe
-
Size
845KB
-
MD5
4430b4864bdb0536bb555c64f90a6fdf
-
SHA1
9692cd79639a1f228a389472b65ab04f3c016536
-
SHA256
bbc6bbbf62040d31c403ebb6cc1fde194f4676c3f7dde52af531d88aefc0238b
-
SHA512
b030596c8e6d605088f8bc503f0fe012cdf2398109459766dfbaf647070fe1cac3940292bd0089e334da309989129df0f6577fcfdbda58e0d15a10a8d43a436b
-
SSDEEP
24576:tvS04YNEMuExDiU6E5R9s8xY/2l/dHMIbt+rm:tF4auS+UjfU2THMIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-