General
-
Target
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
-
Size
920KB
-
Sample
250123-bkgb1svlex
-
MD5
b08bc930dc90e54bc888a9b8195ecc12
-
SHA1
3019337f580bdc0c54c01a79e5144143fe10f17d
-
SHA256
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
-
SHA512
c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20
-
SSDEEP
24576:bwV4MROxnFZ3+kTZ1rZlI0AilFEvxHirXrD4:bwCMi7nrZlI0AilFEvxHir
Behavioral task
behavioral1
Sample
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
fake2
192.168.50.22:10134
d4279019eb0e484a85ded599a3e44bc6
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%appdata%\fake2\fake2.exe
-
reconnect_delay
10000
-
registry_keyname
fake2
-
taskscheduler_taskname
fakee2
-
watchdog_path
AppData\fake2.exe
Targets
-
-
Target
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
-
Size
920KB
-
MD5
b08bc930dc90e54bc888a9b8195ecc12
-
SHA1
3019337f580bdc0c54c01a79e5144143fe10f17d
-
SHA256
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
-
SHA512
c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20
-
SSDEEP
24576:bwV4MROxnFZ3+kTZ1rZlI0AilFEvxHirXrD4:bwCMi7nrZlI0AilFEvxHir
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-