General
-
Target
ce50de3fb504c11827ad22791e6c165cb803cfd1c3039fedac3ab79641ae661b
-
Size
3.0MB
-
Sample
250131-bgap3awrdv
-
MD5
951b9c287b1459f3ad0e22779a6d999e
-
SHA1
a17cfe2ad70c6dc7fca315d5f88cf19f2683d006
-
SHA256
ce50de3fb504c11827ad22791e6c165cb803cfd1c3039fedac3ab79641ae661b
-
SHA512
10820bed94cc0dd8d8bd10f07f41982059afeff22d4a6d938a9dc1dd1921e4534d4ed5a7e8d3dd0effa49edfbc17bd23c4153127ef9d39af5787f37878096252
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
ce50de3fb504c11827ad22791e6c165cb803cfd1c3039fedac3ab79641ae661b.exe
Resource
win7-20241010-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:22514
sudo_pyfhdzqzq1v1nlw2314nsrmdcg85nhyh
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\flowerjs\gamegame.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
ce50de3fb504c11827ad22791e6c165cb803cfd1c3039fedac3ab79641ae661b
-
Size
3.0MB
-
MD5
951b9c287b1459f3ad0e22779a6d999e
-
SHA1
a17cfe2ad70c6dc7fca315d5f88cf19f2683d006
-
SHA256
ce50de3fb504c11827ad22791e6c165cb803cfd1c3039fedac3ab79641ae661b
-
SHA512
10820bed94cc0dd8d8bd10f07f41982059afeff22d4a6d938a9dc1dd1921e4534d4ed5a7e8d3dd0effa49edfbc17bd23c4153127ef9d39af5787f37878096252
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1