Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 01:03

General

  • Target

    c7bea3b517eadb9c85c4243a162215727c774f1e55f313fd640afad580c09ccb.exe

  • Size

    9.1MB

  • MD5

    0363b6bb63ba0d9b85638d2615afaa67

  • SHA1

    1f5bdb637d0410ffceaaf41bcfa8f3d043d8d17a

  • SHA256

    c7bea3b517eadb9c85c4243a162215727c774f1e55f313fd640afad580c09ccb

  • SHA512

    1c297fe47723309599f90ac0da25eecf493dfa4370cf466b64834b1692e4a9319c980ad8df145717005adddff1062fe94ca55c62edac06678fb03063e825a798

  • SSDEEP

    24576:7X5wgg4MROxnFl3JsPe3rZlI0AilFEvxHiK5hOOOOOOOOOOOOOOOOOOOOOOOOOOB:7X2gDMirnrZlI0AilFEvxHiTB

Malware Config

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Core1 .NET packer 1 IoCs

    Detects packer/loader used by .NET malware.

  • Orcurs Rat Executable 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7bea3b517eadb9c85c4243a162215727c774f1e55f313fd640afad580c09ccb.exe
    "C:\Users\Admin\AppData\Local\Temp\c7bea3b517eadb9c85c4243a162215727c774f1e55f313fd640afad580c09ccb.exe"
    1⤵
      PID:4612

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4612-0-0x00007FFF59F73000-0x00007FFF59F75000-memory.dmp

      Filesize

      8KB

    • memory/4612-1-0x0000000000200000-0x0000000000B2A000-memory.dmp

      Filesize

      9.2MB