General
-
Target
32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c
-
Size
842KB
-
Sample
250124-bps7dasnat
-
MD5
3602f95133255122a54eafe8995d3428
-
SHA1
b314249b6644bb655dad26742a3b263fe0cdcc42
-
SHA256
32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c
-
SHA512
fe2019e2a01bce375cacb63943aa5bf5f15fe0c7d711f154a868a12a27c11b9459ef14be65b6e131cf3fa815d321a274d98eb1e1d2427bb0443a59b4987b50f8
-
SSDEEP
24576:WYNS04YNEMuExDiU6E5R9s8xY/2l/d1LbB83QIbt+rc:WYf4auS+UjfU2Tlb63QIbt+r
Behavioral task
behavioral1
Sample
32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
192.168.0.40
94.4.114.86
835142a879ae44f2802247118fa98230
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/02/2025 00:26:38
-
plugins
AgUFyfihswTdIPqEArukcmEdSF06Hw9CAFMAbwBEACAAUAByAG8AdABlAGMAdABpAG8AbgAHAzEALgAwAEEgZgAzADAAZAAyADgANQA3AGIANwAzADUANAAyADgAMgA5ADIAZgBiADMAYwAxADkAOQA0ADYAMwAxADQANwBkAAEAAAACAg==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c
-
Size
842KB
-
MD5
3602f95133255122a54eafe8995d3428
-
SHA1
b314249b6644bb655dad26742a3b263fe0cdcc42
-
SHA256
32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c
-
SHA512
fe2019e2a01bce375cacb63943aa5bf5f15fe0c7d711f154a868a12a27c11b9459ef14be65b6e131cf3fa815d321a274d98eb1e1d2427bb0443a59b4987b50f8
-
SSDEEP
24576:WYNS04YNEMuExDiU6E5R9s8xY/2l/d1LbB83QIbt+rc:WYf4auS+UjfU2Tlb63QIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-