General
-
Target
https://njratnik667.hopto.org/1.exe
-
Sample
250114-zdz3js1mfj
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://njratnik667.hopto.org/1.exe
Resource
win11-20241007-en
Malware Config
Extracted
orcus
HacKed
njratnik667.hopto.org:10134
ec0265501148482a90b3681c1b46d412
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
C:\Windows\dllhost.exe
-
reconnect_delay
10000
-
registry_keyname
Defender Update
-
taskscheduler_taskname
Windows Update
-
watchdog_path
AppData\RuntimeBroker.exe
Targets
-
-
Target
https://njratnik667.hopto.org/1.exe
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Orcus family
-
Orcurs Rat Executable
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1