General
-
Target
8ebc0c030b3fd9b53ad0fe4e920174e8d3fd25461a1d22b4fd4a012b9338bc8b
-
Size
3.0MB
-
Sample
250131-bgb8wswrdw
-
MD5
75a93b86c99dc0e7fff18db443f5e3c3
-
SHA1
3af26b9a70d5d5e44646b57a17a0b49c5013a077
-
SHA256
8ebc0c030b3fd9b53ad0fe4e920174e8d3fd25461a1d22b4fd4a012b9338bc8b
-
SHA512
742159e50e65e0cb41880c78a87f2cf10f9a1cf41cce2621d32e2b8112fc071fc982a44fc57f43e924ba419959774eb1dc80ae985d1a53a6a1379bd9706d4c93
-
SSDEEP
49152:Y1HS7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpbu/nRFfjI7L0qb:YUHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
8ebc0c030b3fd9b53ad0fe4e920174e8d3fd25461a1d22b4fd4a012b9338bc8b.exe
Resource
win7-20241010-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:22514
sudo_ttvk66p6to00n0sc1hht66fqfo18au2w
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\multisecureprivate\multitraffic.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
8ebc0c030b3fd9b53ad0fe4e920174e8d3fd25461a1d22b4fd4a012b9338bc8b
-
Size
3.0MB
-
MD5
75a93b86c99dc0e7fff18db443f5e3c3
-
SHA1
3af26b9a70d5d5e44646b57a17a0b49c5013a077
-
SHA256
8ebc0c030b3fd9b53ad0fe4e920174e8d3fd25461a1d22b4fd4a012b9338bc8b
-
SHA512
742159e50e65e0cb41880c78a87f2cf10f9a1cf41cce2621d32e2b8112fc071fc982a44fc57f43e924ba419959774eb1dc80ae985d1a53a6a1379bd9706d4c93
-
SSDEEP
49152:Y1HS7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpbu/nRFfjI7L0qb:YUHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-