General

  • Target

    a97a1a2989aa0376a945702d56b3e48f689873222c5ff3605d2ceced2fcc395c

  • Size

    3.0MB

  • Sample

    250125-bgv11axpbs

  • MD5

    62b979701e8d5ff4c7c49af4c4b69dca

  • SHA1

    ff23caf424ade62e9d789cb823cbf9eb0fc3d9ed

  • SHA256

    a97a1a2989aa0376a945702d56b3e48f689873222c5ff3605d2ceced2fcc395c

  • SHA512

    d6d747f94e1b82d4f7b701bceeb2f0d2e02858dd08e50d38272a457554063ebbfecbf368c4298e6a83fa36a9d1cd73949bbe7683248802405672a2f9591e85b6

  • SSDEEP

    49152:ys7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:ysHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

packlab

C2

31.44.184.52:50079

Mutex

sudo_ld91xbpc2kl6yn2iq5m7rnm9wlvhevm0

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\geoprivateline\wpwordpress.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      a97a1a2989aa0376a945702d56b3e48f689873222c5ff3605d2ceced2fcc395c

    • Size

      3.0MB

    • MD5

      62b979701e8d5ff4c7c49af4c4b69dca

    • SHA1

      ff23caf424ade62e9d789cb823cbf9eb0fc3d9ed

    • SHA256

      a97a1a2989aa0376a945702d56b3e48f689873222c5ff3605d2ceced2fcc395c

    • SHA512

      d6d747f94e1b82d4f7b701bceeb2f0d2e02858dd08e50d38272a457554063ebbfecbf368c4298e6a83fa36a9d1cd73949bbe7683248802405672a2f9591e85b6

    • SSDEEP

      49152:ys7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:ysHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks