General

  • Target

    8502a6356d3f49ff38909be8fe08f982bc709939181e360f30d3f1e6f18ab9a3

  • Size

    914KB

  • Sample

    250118-bdwhcsyqbk

  • MD5

    95587f3e29171f8d4b63209ad3c20b5c

  • SHA1

    21ea5d7fb0174a981d1a859f4bde2aeb0d74f955

  • SHA256

    8502a6356d3f49ff38909be8fe08f982bc709939181e360f30d3f1e6f18ab9a3

  • SHA512

    bd7fa338fbc365a78be06355ac13c71bced27b58c12dd7d20a551a650cfae27c4365e3f3001a8b9916831fc7e9b88530203ec7be152d9021509e7091b83be127

  • SSDEEP

    24576:Ram4MROxnFD3ww8XlrrcI0AilFEvxHPSqooP:ROMiJsrrcI0AilFEvxHPS

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

e8c5af09f6df4beaa06157932bb3cb4a

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %appdata%\Win32Data\Temp\098234\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    orcs

  • taskscheduler_taskname

    orcs

  • watchdog_path

    AppData\svchost.exe

Targets

    • Target

      8502a6356d3f49ff38909be8fe08f982bc709939181e360f30d3f1e6f18ab9a3

    • Size

      914KB

    • MD5

      95587f3e29171f8d4b63209ad3c20b5c

    • SHA1

      21ea5d7fb0174a981d1a859f4bde2aeb0d74f955

    • SHA256

      8502a6356d3f49ff38909be8fe08f982bc709939181e360f30d3f1e6f18ab9a3

    • SHA512

      bd7fa338fbc365a78be06355ac13c71bced27b58c12dd7d20a551a650cfae27c4365e3f3001a8b9916831fc7e9b88530203ec7be152d9021509e7091b83be127

    • SSDEEP

      24576:Ram4MROxnFD3ww8XlrrcI0AilFEvxHPSqooP:ROMiJsrrcI0AilFEvxHPS

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks