General
-
Target
26117e73d2cd9417ae54ffe789a2ff9bc71202f3d29c68b0374628cf04d9299b
-
Size
924KB
-
Sample
250129-br273awqbs
-
MD5
d4c903dd16913f5133997999e217a079
-
SHA1
7a73a4e1d55c4265b3b5449b7a64fa08e18a7273
-
SHA256
26117e73d2cd9417ae54ffe789a2ff9bc71202f3d29c68b0374628cf04d9299b
-
SHA512
cb6be573946d278c814aeffe5a67e4473b7b5037191ca0de65003170744125f466b78c3ae47cd92c3ab66514a0659dee3794be086786e495310b58dc02c54e3f
-
SSDEEP
24576:dGq4MROxnFE33O3orrcI0AilFEvxHPXoop:duMiuMorrcI0AilFEvxHP
Behavioral task
behavioral1
Sample
26117e73d2cd9417ae54ffe789a2ff9bc71202f3d29c68b0374628cf04d9299b.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
Test_one
192.168.11.172:55505
8e30ae40441e44d7964395f4918297b2
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Realtek\Realtek.exe
-
reconnect_delay
10000
-
registry_keyname
Realtek HD Audio UniversaI Service
-
taskscheduler_taskname
Realtek HD Audio Universal Service
-
watchdog_path
AppData\Realtek_audio.exe
Targets
-
-
Target
26117e73d2cd9417ae54ffe789a2ff9bc71202f3d29c68b0374628cf04d9299b
-
Size
924KB
-
MD5
d4c903dd16913f5133997999e217a079
-
SHA1
7a73a4e1d55c4265b3b5449b7a64fa08e18a7273
-
SHA256
26117e73d2cd9417ae54ffe789a2ff9bc71202f3d29c68b0374628cf04d9299b
-
SHA512
cb6be573946d278c814aeffe5a67e4473b7b5037191ca0de65003170744125f466b78c3ae47cd92c3ab66514a0659dee3794be086786e495310b58dc02c54e3f
-
SSDEEP
24576:dGq4MROxnFE33O3orrcI0AilFEvxHPXoop:duMiuMorrcI0AilFEvxHP
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-