General
-
Target
ezz.exe
-
Size
839KB
-
Sample
250115-y4tssatmfv
-
MD5
a9a2e25c8246f12b57772f3bf80a21e3
-
SHA1
364f350fded32f413889da44ed1bb8ad6a1e59c0
-
SHA256
7b7b51a0b246edc07ce106ecd362d46565e16018635160a6394b5aa47bb9e14b
-
SHA512
badd84614356c1599abcd4d702bbb8a01332325a38859888f53cb39174d928f8029bc342af267552bda56ba11e4d81c8cdd03570ac1128eae61b6be96149b46c
-
SSDEEP
24576:DpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rE:DL4auS+UjfU2TmdIbt+r
Malware Config
Extracted
orcus
0.tcp.ngrok.io
82e2789fd09c4b619c81f6d93a412b7d
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%temp%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
04/19/2023 16:47:30
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
ezz.exe
-
Size
839KB
-
MD5
a9a2e25c8246f12b57772f3bf80a21e3
-
SHA1
364f350fded32f413889da44ed1bb8ad6a1e59c0
-
SHA256
7b7b51a0b246edc07ce106ecd362d46565e16018635160a6394b5aa47bb9e14b
-
SHA512
badd84614356c1599abcd4d702bbb8a01332325a38859888f53cb39174d928f8029bc342af267552bda56ba11e4d81c8cdd03570ac1128eae61b6be96149b46c
-
SSDEEP
24576:DpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rE:DL4auS+UjfU2TmdIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-