General

  • Target

    49959dde61d60467f69a81253006ef7f23b9e5dc6f6bb714180240c3e50b57b4

  • Size

    843KB

  • Sample

    250120-bc7h8strgj

  • MD5

    948ec552784ee8ccb45b56b5ae7d7916

  • SHA1

    1cdb1221c268721c8741f5f63ab197d850f62073

  • SHA256

    49959dde61d60467f69a81253006ef7f23b9e5dc6f6bb714180240c3e50b57b4

  • SHA512

    c7055d1cdb5f7a988730a821a15d110ba8d1dec8ea6773d50116df4a32a0e481a365e58b447b95a1bff1466f3398036131a869a2bb194d26d8f90d4af8da5d44

  • SSDEEP

    24576:YBS04YNEMuExDiU6E5R9s8xY/2l/dsfIbt+r6:Yj4auS+UjfU2TsfIbt+r

Malware Config

Extracted

Family

orcus

C2

127.0.0.1

Mutex

3fb9822df95843c0abd28da563faa649

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    01/19/2025 14:56:27

  • plugins

    AgUFl6aNkQPXkQKOmwKLvFcpr24sKCsVRABpAHMAYQBiAGwAZQAgAFcAZQBiAGMAYQBtACAATABpAGcAaAB0AHMABwMxAC4AMABBIDQANQA2ADMAMQBkADEAOAAzADMAYgA1ADQAYwA5AGMAOAA0ADMANAA4ADUAMQA0ADQAOQAyADgAZQA5AGMAMwABAAAAAgI=

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_name

    Audio HD Driver

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Targets

    • Target

      49959dde61d60467f69a81253006ef7f23b9e5dc6f6bb714180240c3e50b57b4

    • Size

      843KB

    • MD5

      948ec552784ee8ccb45b56b5ae7d7916

    • SHA1

      1cdb1221c268721c8741f5f63ab197d850f62073

    • SHA256

      49959dde61d60467f69a81253006ef7f23b9e5dc6f6bb714180240c3e50b57b4

    • SHA512

      c7055d1cdb5f7a988730a821a15d110ba8d1dec8ea6773d50116df4a32a0e481a365e58b447b95a1bff1466f3398036131a869a2bb194d26d8f90d4af8da5d44

    • SSDEEP

      24576:YBS04YNEMuExDiU6E5R9s8xY/2l/dsfIbt+r6:Yj4auS+UjfU2TsfIbt+r

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks