General
-
Target
eafwafafa.exe
-
Size
839KB
-
Sample
250115-xf8rcssqbp
-
MD5
118dfc8a885a3d4e965570149afe3893
-
SHA1
224a6d377419a6b2b8214ec0af9b07f3cfe6287c
-
SHA256
c64daa27c0465771e2df05a9dfd33540793005c5e500b3641f5c52fc06845b82
-
SHA512
687159a7022036fdddc6973deb0a540ee70f8545c832b065cca712539ee41dca3037949e7f33b388fabdb05f55685f65ead7889b319338d645fb64f3292d8b5c
-
SSDEEP
24576:QpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rA:QL4auS+UjfU2TmdIbt+r
Malware Config
Extracted
orcus
0.tcp.ngrok.io
f28cba43d1d1437ba028c4fbeb0b8635
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/15/2025 15:18:20
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
eafwafafa.exe
-
Size
839KB
-
MD5
118dfc8a885a3d4e965570149afe3893
-
SHA1
224a6d377419a6b2b8214ec0af9b07f3cfe6287c
-
SHA256
c64daa27c0465771e2df05a9dfd33540793005c5e500b3641f5c52fc06845b82
-
SHA512
687159a7022036fdddc6973deb0a540ee70f8545c832b065cca712539ee41dca3037949e7f33b388fabdb05f55685f65ead7889b319338d645fb64f3292d8b5c
-
SSDEEP
24576:QpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rA:QL4auS+UjfU2TmdIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-