General
-
Target
nigger.exe
-
Size
903KB
-
Sample
250117-tyaqhawkf1
-
MD5
72524fbc022c3beb0550f62e5e727343
-
SHA1
8671520865d2c9c31e63c4c8c5405bc6e16d30d1
-
SHA256
51fc8dc03eca49528064dc469aafa0d1df10bd5a48a22896dfc4c5cc5f8899a5
-
SHA512
a09077f5b6cfd692e7b088ed1c9da6ce4afc52ab1f60bce6f5968069d85ae78fe1bf23de185443e1ed01da01b262cc5c63e6a4cecca0bf8f5fac8a3aebe90157
-
SSDEEP
12288:r8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBH:Y3s4MROxnF9LqrZlI0AilFEvxHiho
Behavioral task
behavioral1
Sample
nigger.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
nigger.exe
Resource
win11-20241007-en
Malware Config
Extracted
orcus
2.tcp.eu.ngrok.io:16912
d2c1eb76639a415ebb82e3e5f8d92836
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
nigger.exe
-
Size
903KB
-
MD5
72524fbc022c3beb0550f62e5e727343
-
SHA1
8671520865d2c9c31e63c4c8c5405bc6e16d30d1
-
SHA256
51fc8dc03eca49528064dc469aafa0d1df10bd5a48a22896dfc4c5cc5f8899a5
-
SHA512
a09077f5b6cfd692e7b088ed1c9da6ce4afc52ab1f60bce6f5968069d85ae78fe1bf23de185443e1ed01da01b262cc5c63e6a4cecca0bf8f5fac8a3aebe90157
-
SSDEEP
12288:r8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBH:Y3s4MROxnF9LqrZlI0AilFEvxHiho
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-