General

  • Target

    9964218e6e088147333fc5485777160fbdb8fd63fc60fbca7653f3ea81cf59ca

  • Size

    3.0MB

  • Sample

    250115-bdy89axlgj

  • MD5

    1a948267c6fe22a7e590600b26beea3f

  • SHA1

    a26eb4bc6bd38d7a2f16900ca2efaf6e5126f97c

  • SHA256

    9964218e6e088147333fc5485777160fbdb8fd63fc60fbca7653f3ea81cf59ca

  • SHA512

    97af559232254cd0e571ce0a9aad83c72147e76fed2e3363887f0a89e1f60a92ecdbd334b98ed14e3c78408dc8538c9e09c23769e9e51831529f41fe35d13c2a

  • SSDEEP

    49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

Новый тег

C2

31.44.184.52:36345

Mutex

sudo_sn5ypiyq8vda9y45odaduiks823obdn3

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\videovm_\cdnprivate.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      9964218e6e088147333fc5485777160fbdb8fd63fc60fbca7653f3ea81cf59ca

    • Size

      3.0MB

    • MD5

      1a948267c6fe22a7e590600b26beea3f

    • SHA1

      a26eb4bc6bd38d7a2f16900ca2efaf6e5126f97c

    • SHA256

      9964218e6e088147333fc5485777160fbdb8fd63fc60fbca7653f3ea81cf59ca

    • SHA512

      97af559232254cd0e571ce0a9aad83c72147e76fed2e3363887f0a89e1f60a92ecdbd334b98ed14e3c78408dc8538c9e09c23769e9e51831529f41fe35d13c2a

    • SSDEEP

      49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks