General
-
Target
ez.exe
-
Size
903KB
-
Sample
250116-tstlesyrhm
-
MD5
1f0eaf2212e650d546ce25bed971ea6a
-
SHA1
10964f65e5f5cb5b39793948c47960b3df816a78
-
SHA256
5488f8ebdd761b238ac30772eaaf4bc470da2d9b518c13edccfae3ab4c3e9721
-
SHA512
d4773894f5a38fc4d994aff8985311e16310de775fbe88e0caf67aa0cd45b89ad2f175daa7fd3465b2112ed4c490c36832d92ab23b71bc50e568c4bd9aea8f68
-
SSDEEP
12288:R8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBy:e3s4MROxnF9LqrZlI0AilFEvxHiVeo
Behavioral task
behavioral1
Sample
ez.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
orcus
0.tcp.ngrok.io:18585
6aa90683b44541319ca2fec646e0dff6
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
ez.exe
-
Size
903KB
-
MD5
1f0eaf2212e650d546ce25bed971ea6a
-
SHA1
10964f65e5f5cb5b39793948c47960b3df816a78
-
SHA256
5488f8ebdd761b238ac30772eaaf4bc470da2d9b518c13edccfae3ab4c3e9721
-
SHA512
d4773894f5a38fc4d994aff8985311e16310de775fbe88e0caf67aa0cd45b89ad2f175daa7fd3465b2112ed4c490c36832d92ab23b71bc50e568c4bd9aea8f68
-
SSDEEP
12288:R8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBy:e3s4MROxnF9LqrZlI0AilFEvxHiVeo
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1