Behavioral task
behavioral1
Sample
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe
Resource
win7-20240903-en
General
-
Target
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
-
Size
920KB
-
MD5
b08bc930dc90e54bc888a9b8195ecc12
-
SHA1
3019337f580bdc0c54c01a79e5144143fe10f17d
-
SHA256
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
-
SHA512
c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20
-
SSDEEP
24576:bwV4MROxnFZ3+kTZ1rZlI0AilFEvxHirXrD4:bwCMi7nrZlI0AilFEvxHir
Malware Config
Extracted
orcus
fake2
192.168.50.22:10134
d4279019eb0e484a85ded599a3e44bc6
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%appdata%\fake2\fake2.exe
-
reconnect_delay
10000
-
registry_keyname
fake2
-
taskscheduler_taskname
fakee2
-
watchdog_path
AppData\fake2.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8
Files
-
f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 915KB - Virtual size: 914KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ