General

  • Target

    74299c629170342b9340e5391807a8d153023a74610a6447a139a99949f0fdbc

  • Size

    907KB

  • Sample

    250122-bgtsya1kfn

  • MD5

    366bd710e27f2aa50dc056b05b6d57c6

  • SHA1

    f22b0da1da5cdebc48dcc4ca4a54210b36ae9e1d

  • SHA256

    74299c629170342b9340e5391807a8d153023a74610a6447a139a99949f0fdbc

  • SHA512

    c1c4292545e1b94c2150226eda24b0c5edbefba5695f86e8143eacebe3197f493c782ee9cb09412010c7475199cceab502025d616ce3695635f707ac72a8ae87

  • SSDEEP

    24576:Jj54MROxnFj3rrkxrrcI0AilFEvxHPIooT:JyMi1fqrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

35.202.161.174:8080

Mutex

5c75563d05504d81b7e68462b45e649f

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\Runtimers\Runtimer.exe

  • reconnect_delay

    10000

  • registry_keyname

    RuntimerHD

  • taskscheduler_taskname

    RuntimerHD

  • watchdog_path

    AppData\Runtimer32.exe

Targets

    • Target

      74299c629170342b9340e5391807a8d153023a74610a6447a139a99949f0fdbc

    • Size

      907KB

    • MD5

      366bd710e27f2aa50dc056b05b6d57c6

    • SHA1

      f22b0da1da5cdebc48dcc4ca4a54210b36ae9e1d

    • SHA256

      74299c629170342b9340e5391807a8d153023a74610a6447a139a99949f0fdbc

    • SHA512

      c1c4292545e1b94c2150226eda24b0c5edbefba5695f86e8143eacebe3197f493c782ee9cb09412010c7475199cceab502025d616ce3695635f707ac72a8ae87

    • SSDEEP

      24576:Jj54MROxnFj3rrkxrrcI0AilFEvxHPIooT:JyMi1fqrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks