Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 13:06
Behavioral task
behavioral1
Sample
chinesespy.exe
Resource
win7-20241010-en
General
-
Target
chinesespy.exe
-
Size
903KB
-
MD5
45b933296191359f5a8dc178c2fb5fe2
-
SHA1
a8670c1bf5622de1d0fe26dcd7f1b48d2c98db18
-
SHA256
b8a15311ed13113ed3f7247859db765c5034151e31ccccbc0651b43c0e9709cc
-
SHA512
d7be0a68d3f67ecbaff1a27e44a4daa45c38e8d845c1ff4dd7b4f64b91661b35f795803c32e16923ebbc474111752fee44293876da61a5c889f033c696cd5b85
-
SSDEEP
12288:O0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCBfm9rR6W7BaepBwzo7dG1lFlWs:Dam4MROxnF4HrrcI0AilFEvxHPUoo1
Malware Config
Extracted
orcus
171.113.133.41:10134
52365d581fe14390b774a210d03d4b04
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus family
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral2/memory/2348-1-0x0000000000EA0000-0x0000000000F88000-memory.dmp orcus -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chinesespy.exe